File: | bsd/netinet/in_mcast.c |
Warning: | line 1853, column 11 Copies out a struct with untouched element(s): __msfr_align, msfr_srcs |
1 | /* | |||
2 | * Copyright (c) 2010-2016 Apple Inc. All rights reserved. | |||
3 | * | |||
4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | |||
5 | * | |||
6 | * This file contains Original Code and/or Modifications of Original Code | |||
7 | * as defined in and that are subject to the Apple Public Source License | |||
8 | * Version 2.0 (the 'License'). You may not use this file except in | |||
9 | * compliance with the License. The rights granted to you under the License | |||
10 | * may not be used to create, or enable the creation or redistribution of, | |||
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |||
12 | * circumvent, violate, or enable the circumvention or violation of, any | |||
13 | * terms of an Apple operating system software license agreement. | |||
14 | * | |||
15 | * Please obtain a copy of the License at | |||
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |||
17 | * | |||
18 | * The Original Code and all software distributed under the License are | |||
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |||
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |||
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |||
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |||
23 | * Please see the License for the specific language governing rights and | |||
24 | * limitations under the License. | |||
25 | * | |||
26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | |||
27 | */ | |||
28 | /*- | |||
29 | * Copyright (c) 2007-2009 Bruce Simpson. | |||
30 | * Copyright (c) 2005 Robert N. M. Watson. | |||
31 | * All rights reserved. | |||
32 | * | |||
33 | * Redistribution and use in source and binary forms, with or without | |||
34 | * modification, are permitted provided that the following conditions | |||
35 | * are met: | |||
36 | * 1. Redistributions of source code must retain the above copyright | |||
37 | * notice, this list of conditions and the following disclaimer. | |||
38 | * 2. Redistributions in binary form must reproduce the above copyright | |||
39 | * notice, this list of conditions and the following disclaimer in the | |||
40 | * documentation and/or other materials provided with the distribution. | |||
41 | * 3. The name of the author may not be used to endorse or promote | |||
42 | * products derived from this software without specific prior written | |||
43 | * permission. | |||
44 | * | |||
45 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND | |||
46 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |||
47 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |||
48 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |||
49 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |||
50 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |||
51 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |||
52 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |||
53 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |||
54 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |||
55 | * SUCH DAMAGE. | |||
56 | */ | |||
57 | ||||
58 | /* | |||
59 | * IPv4 multicast socket, group, and socket option processing module. | |||
60 | */ | |||
61 | ||||
62 | #include <sys/cdefs.h> | |||
63 | ||||
64 | #include <sys/param.h> | |||
65 | #include <sys/systm.h> | |||
66 | #include <sys/kernel.h> | |||
67 | #include <sys/malloc.h> | |||
68 | #include <sys/mbuf.h> | |||
69 | #include <sys/protosw.h> | |||
70 | #include <sys/socket.h> | |||
71 | #include <sys/socketvar.h> | |||
72 | #include <sys/protosw.h> | |||
73 | #include <sys/sysctl.h> | |||
74 | #include <sys/tree.h> | |||
75 | #include <sys/mcache.h> | |||
76 | ||||
77 | #include <kern/zalloc.h> | |||
78 | ||||
79 | #include <pexpert/pexpert.h> | |||
80 | ||||
81 | #include <net/if.h> | |||
82 | #include <net/if_dl.h> | |||
83 | #include <net/route.h> | |||
84 | ||||
85 | #include <netinet/in.h> | |||
86 | #include <netinet/in_systm.h> | |||
87 | #include <netinet/in_pcb.h> | |||
88 | #include <netinet/in_var.h> | |||
89 | #include <netinet/ip_var.h> | |||
90 | #include <netinet/igmp_var.h> | |||
91 | ||||
92 | #ifndef __SOCKUNION_DECLARED | |||
93 | union sockunion { | |||
94 | struct sockaddr_storage ss; | |||
95 | struct sockaddr sa; | |||
96 | struct sockaddr_dl sdl; | |||
97 | struct sockaddr_in sin; | |||
98 | }; | |||
99 | typedef union sockunion sockunion_t; | |||
100 | #define __SOCKUNION_DECLARED | |||
101 | #endif /* __SOCKUNION_DECLARED */ | |||
102 | ||||
103 | /* | |||
104 | * Functions with non-static linkage defined in this file should be | |||
105 | * declared in in_var.h: | |||
106 | * imo_multi_filter() | |||
107 | * in_addmulti() | |||
108 | * in_delmulti() | |||
109 | * in_joingroup() | |||
110 | * in_leavegroup() | |||
111 | * and ip_var.h: | |||
112 | * inp_freemoptions() | |||
113 | * inp_getmoptions() | |||
114 | * inp_setmoptions() | |||
115 | * | |||
116 | * XXX: Both carp and pf need to use the legacy (*,G) KPIs in_addmulti() | |||
117 | * and in_delmulti(). | |||
118 | */ | |||
119 | static void imf_commit(struct in_mfilter *); | |||
120 | static int imf_get_source(struct in_mfilter *imf, | |||
121 | const struct sockaddr_in *psin, | |||
122 | struct in_msource **); | |||
123 | static struct in_msource * | |||
124 | imf_graft(struct in_mfilter *, const uint8_t, | |||
125 | const struct sockaddr_in *); | |||
126 | static int imf_prune(struct in_mfilter *, const struct sockaddr_in *); | |||
127 | static void imf_rollback(struct in_mfilter *); | |||
128 | static void imf_reap(struct in_mfilter *); | |||
129 | static int imo_grow(struct ip_moptions *, size_t); | |||
130 | static size_t imo_match_group(const struct ip_moptions *, | |||
131 | const struct ifnet *, const struct sockaddr *); | |||
132 | static struct in_msource * | |||
133 | imo_match_source(const struct ip_moptions *, const size_t, | |||
134 | const struct sockaddr *); | |||
135 | static void ims_merge(struct ip_msource *ims, | |||
136 | const struct in_msource *lims, const int rollback); | |||
137 | static int in_getmulti(struct ifnet *, const struct in_addr *, | |||
138 | struct in_multi **); | |||
139 | static int in_joingroup(struct ifnet *, const struct in_addr *, | |||
140 | struct in_mfilter *, struct in_multi **); | |||
141 | static int inm_get_source(struct in_multi *inm, const in_addr_t haddr, | |||
142 | const int noalloc, struct ip_msource **pims); | |||
143 | static int inm_is_ifp_detached(const struct in_multi *); | |||
144 | static int inm_merge(struct in_multi *, /*const*/ struct in_mfilter *); | |||
145 | static void inm_reap(struct in_multi *); | |||
146 | static struct ip_moptions * | |||
147 | inp_findmoptions(struct inpcb *); | |||
148 | static int inp_get_source_filters(struct inpcb *, struct sockopt *); | |||
149 | static struct ifnet * | |||
150 | inp_lookup_mcast_ifp(const struct inpcb *, | |||
151 | const struct sockaddr_in *, const struct in_addr); | |||
152 | static int inp_block_unblock_source(struct inpcb *, struct sockopt *); | |||
153 | static int inp_set_multicast_if(struct inpcb *, struct sockopt *); | |||
154 | static int inp_set_source_filters(struct inpcb *, struct sockopt *); | |||
155 | static int sysctl_ip_mcast_filters SYSCTL_HANDLER_ARGS(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req); | |||
156 | static struct ifnet * ip_multicast_if(struct in_addr *, unsigned int *); | |||
157 | static __inline__ int ip_msource_cmp(const struct ip_msource *, | |||
158 | const struct ip_msource *); | |||
159 | ||||
160 | SYSCTL_NODE(_net_inet_ip, OID_AUTO, mcast, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "IPv4 multicast")struct sysctl_oid_list sysctl__net_inet_ip_mcast_children; struct sysctl_oid sysctl__net_inet_ip_mcast = { &sysctl__net_inet_ip_children , { 0 }, (-1), (int)(1|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), (void*)&sysctl__net_inet_ip_mcast_children, (int)(0), "mcast" , 0, "N", "IPv4 multicast", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast;; | |||
161 | ||||
162 | static u_long in_mcast_maxgrpsrc = IP_MAX_GROUP_SRC_FILTER512; | |||
163 | SYSCTL_LONG(_net_inet_ip_mcast, OID_AUTO, maxgrpsrc,struct sysctl_oid sysctl__net_inet_ip_mcast_maxgrpsrc = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in_mcast_maxgrpsrc , (int)(0), "maxgrpsrc", sysctl_handle_long, "L", "Max source filters per group" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_maxgrpsrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_maxgrpsrc; typedef char _sysctl__net_inet_ip_mcast_maxgrpsrc_size_check [(__builtin_constant_p(&in_mcast_maxgrpsrc) || sizeof(*(& in_mcast_maxgrpsrc)) == sizeof(long)) ? 0 : -1]; | |||
164 | CTLFLAG_RW | CTLFLAG_LOCKED, &in_mcast_maxgrpsrc, "Max source filters per group")struct sysctl_oid sysctl__net_inet_ip_mcast_maxgrpsrc = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in_mcast_maxgrpsrc , (int)(0), "maxgrpsrc", sysctl_handle_long, "L", "Max source filters per group" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_maxgrpsrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_maxgrpsrc; typedef char _sysctl__net_inet_ip_mcast_maxgrpsrc_size_check [(__builtin_constant_p(&in_mcast_maxgrpsrc) || sizeof(*(& in_mcast_maxgrpsrc)) == sizeof(long)) ? 0 : -1];; | |||
165 | ||||
166 | static u_long in_mcast_maxsocksrc = IP_MAX_SOCK_SRC_FILTER128; | |||
167 | SYSCTL_LONG(_net_inet_ip_mcast, OID_AUTO, maxsocksrc,struct sysctl_oid sysctl__net_inet_ip_mcast_maxsocksrc = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_maxsocksrc; typedef char _sysctl__net_inet_ip_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in_mcast_maxsocksrc) || sizeof(*( &in_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1]; | |||
168 | CTLFLAG_RW | CTLFLAG_LOCKED, &in_mcast_maxsocksrc,struct sysctl_oid sysctl__net_inet_ip_mcast_maxsocksrc = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_maxsocksrc; typedef char _sysctl__net_inet_ip_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in_mcast_maxsocksrc) || sizeof(*( &in_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1]; | |||
169 | "Max source filters per socket")struct sysctl_oid sysctl__net_inet_ip_mcast_maxsocksrc = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_maxsocksrc; typedef char _sysctl__net_inet_ip_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in_mcast_maxsocksrc) || sizeof(*( &in_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1];; | |||
170 | ||||
171 | int in_mcast_loop = IP_DEFAULT_MULTICAST_LOOP1; | |||
172 | SYSCTL_INT(_net_inet_ip_mcast, OID_AUTO, loop, CTLFLAG_RW | CTLFLAG_LOCKED,struct sysctl_oid sysctl__net_inet_ip_mcast_loop = { &sysctl__net_inet_ip_mcast_children , { 0 }, (-1), (int)(2|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), &in_mcast_loop, (int)(0), "loop", sysctl_handle_int, "I" , "Loopback multicast datagrams by default", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_loop __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_loop ; typedef char _sysctl__net_inet_ip_mcast_loop_size_check[(__builtin_constant_p (&in_mcast_loop) || sizeof(*(&in_mcast_loop)) == sizeof (int)) ? 0 : -1]; | |||
173 | &in_mcast_loop, 0, "Loopback multicast datagrams by default")struct sysctl_oid sysctl__net_inet_ip_mcast_loop = { &sysctl__net_inet_ip_mcast_children , { 0 }, (-1), (int)(2|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), &in_mcast_loop, (int)(0), "loop", sysctl_handle_int, "I" , "Loopback multicast datagrams by default", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_loop __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_loop ; typedef char _sysctl__net_inet_ip_mcast_loop_size_check[(__builtin_constant_p (&in_mcast_loop) || sizeof(*(&in_mcast_loop)) == sizeof (int)) ? 0 : -1];; | |||
174 | ||||
175 | SYSCTL_NODE(_net_inet_ip_mcast, OID_AUTO, filters,struct sysctl_oid_list sysctl__net_inet_ip_mcast_filters_children ; struct sysctl_oid sysctl__net_inet_ip_mcast_filters = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet_ip_mcast_filters_children , (int)(0), "filters", sysctl_ip_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_filters; | |||
176 | CTLFLAG_RD | CTLFLAG_LOCKED, sysctl_ip_mcast_filters,struct sysctl_oid_list sysctl__net_inet_ip_mcast_filters_children ; struct sysctl_oid sysctl__net_inet_ip_mcast_filters = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet_ip_mcast_filters_children , (int)(0), "filters", sysctl_ip_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_filters; | |||
177 | "Per-interface stack-wide source filters")struct sysctl_oid_list sysctl__net_inet_ip_mcast_filters_children ; struct sysctl_oid sysctl__net_inet_ip_mcast_filters = { & sysctl__net_inet_ip_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet_ip_mcast_filters_children , (int)(0), "filters", sysctl_ip_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet_ip_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet_ip_mcast_filters;; | |||
178 | ||||
179 | RB_GENERATE_PREV(ip_msource_tree, ip_msource, ims_link, ip_msource_cmp)struct ip_msource *ip_msource_tree_RB_GETPARENT(struct ip_msource *elm) { struct ip_msource *parent = (elm)->ims_link.rbe_parent ; if( parent != ((void *)0)) { parent = (struct ip_msource*)( (uintptr_t)parent & ~(uintptr_t)0x1); return( (struct ip_msource *) ( (parent == (struct ip_msource*) ((void *)0)) ? ((void *) 0): parent)); } return((struct ip_msource*)((void *)0)); } int ip_msource_tree_RB_GETCOLOR(struct ip_msource *elm) { int color = 0; color = (int)((uintptr_t)(elm)->ims_link.rbe_parent & (uintptr_t)0x1); return(color); } void ip_msource_tree_RB_SETCOLOR (struct ip_msource *elm,int color) { struct ip_msource *parent = ip_msource_tree_RB_GETPARENT(elm); if(parent == (struct ip_msource *)((void *)0)) parent = (struct ip_msource*) ((void *)0); (elm )->ims_link.rbe_parent = (struct ip_msource*)((uintptr_t)parent | (unsigned int)color);} struct ip_msource *ip_msource_tree_RB_SETPARENT (struct ip_msource *elm, struct ip_msource *parent) { int color = ip_msource_tree_RB_GETCOLOR(elm); (elm)->ims_link.rbe_parent = parent; if(color) ip_msource_tree_RB_SETCOLOR(elm, color); return(ip_msource_tree_RB_GETPARENT(elm)); } void ip_msource_tree_RB_INSERT_COLOR (struct ip_msource_tree *head, struct ip_msource *elm) { struct ip_msource *parent, *gparent, *tmp; while ((parent = ip_msource_tree_RB_GETPARENT (elm)) != ((void *)0) && ip_msource_tree_RB_GETCOLOR( parent) == 1) { gparent = ip_msource_tree_RB_GETPARENT(parent ); if (parent == (gparent)->ims_link.rbe_left) { tmp = (gparent )->ims_link.rbe_right; if (tmp && ip_msource_tree_RB_GETCOLOR (tmp) == 1) { ip_msource_tree_RB_SETCOLOR(tmp, 0); do { ip_msource_tree_RB_SETCOLOR (parent, 0); ip_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); elm = gparent; continue; } if ((parent)->ims_link.rbe_right == elm) { do { (tmp) = (parent)->ims_link.rbe_right; if ( ((parent)->ims_link.rbe_right = (tmp)->ims_link.rbe_left ) != ((void *)0)) { ip_msource_tree_RB_SETPARENT((tmp)->ims_link .rbe_left,(parent)); } (void)(parent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left) (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT(parent) )->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_left = (parent); ip_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); tmp = parent; parent = elm; elm = tmp; } do { ip_msource_tree_RB_SETCOLOR (parent, 0); ip_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); do { (tmp) = (gparent)->ims_link.rbe_left; if (((gparent )->ims_link.rbe_left = (tmp)->ims_link.rbe_right) != (( void *)0)) { ip_msource_tree_RB_SETPARENT((tmp)->ims_link. rbe_right, (gparent)); } (void)(gparent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(gparent)) != ((void *)0)) { if ((gparent) == (ip_msource_tree_RB_GETPARENT(gparent))-> ims_link.rbe_left) (ip_msource_tree_RB_GETPARENT(gparent))-> ims_link.rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT (gparent))->ims_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->ims_link.rbe_right = (gparent); ip_msource_tree_RB_SETPARENT (gparent, tmp); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); } else { tmp = (gparent)->ims_link.rbe_left; if (tmp && ip_msource_tree_RB_GETCOLOR(tmp) == 1) { ip_msource_tree_RB_SETCOLOR (tmp, 0); do { ip_msource_tree_RB_SETCOLOR(parent, 0); ip_msource_tree_RB_SETCOLOR (gparent, 1); } while ( 0); elm = gparent; continue; } if ((parent )->ims_link.rbe_left == elm) { do { (tmp) = (parent)->ims_link .rbe_left; if (((parent)->ims_link.rbe_left = (tmp)->ims_link .rbe_right) != ((void *)0)) { ip_msource_tree_RB_SETPARENT((tmp )->ims_link.rbe_right, (parent)); } (void)(parent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left) (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT(parent) )->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_right = (parent); ip_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); tmp = parent; parent = elm; elm = tmp; } do { ip_msource_tree_RB_SETCOLOR (parent, 0); ip_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); do { (tmp) = (gparent)->ims_link.rbe_right; if (((gparent )->ims_link.rbe_right = (tmp)->ims_link.rbe_left) != (( void *)0)) { ip_msource_tree_RB_SETPARENT((tmp)->ims_link. rbe_left,(gparent)); } (void)(gparent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(gparent)) != ((void *)0)) { if ((gparent) == (ip_msource_tree_RB_GETPARENT(gparent))-> ims_link.rbe_left) (ip_msource_tree_RB_GETPARENT(gparent))-> ims_link.rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT (gparent))->ims_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->ims_link.rbe_left = (gparent); ip_msource_tree_RB_SETPARENT (gparent, (tmp)); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); } } ip_msource_tree_RB_SETCOLOR(head->rbh_root, 0); } void ip_msource_tree_RB_REMOVE_COLOR(struct ip_msource_tree *head , struct ip_msource *parent, struct ip_msource *elm) { struct ip_msource *tmp; while ((elm == ((void *)0) || ip_msource_tree_RB_GETCOLOR (elm) == 0) && elm != (head)->rbh_root) { if ((parent )->ims_link.rbe_left == elm) { tmp = (parent)->ims_link .rbe_right; if (ip_msource_tree_RB_GETCOLOR(tmp) == 1) { do { ip_msource_tree_RB_SETCOLOR(tmp, 0); ip_msource_tree_RB_SETCOLOR (parent, 1); } while ( 0); do { (tmp) = (parent)->ims_link .rbe_right; if (((parent)->ims_link.rbe_right = (tmp)-> ims_link.rbe_left) != ((void *)0)) { ip_msource_tree_RB_SETPARENT ((tmp)->ims_link.rbe_left,(parent)); } (void)(parent); if ( ip_msource_tree_RB_SETPARENT(tmp, ip_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_left) (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_left = (parent); ip_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); tmp = (parent)->ims_link.rbe_right; } if (((tmp)->ims_link .rbe_left == ((void *)0) || ip_msource_tree_RB_GETCOLOR((tmp) ->ims_link.rbe_left) == 0) && ((tmp)->ims_link. rbe_right == ((void *)0) || ip_msource_tree_RB_GETCOLOR((tmp) ->ims_link.rbe_right) == 0)) { ip_msource_tree_RB_SETCOLOR (tmp, 1); elm = parent; parent = ip_msource_tree_RB_GETPARENT (elm); } else { if ((tmp)->ims_link.rbe_right == ((void *) 0) || ip_msource_tree_RB_GETCOLOR((tmp)->ims_link.rbe_right ) == 0) { struct ip_msource *oleft; if ((oleft = (tmp)->ims_link .rbe_left) != ((void *)0)) ip_msource_tree_RB_SETCOLOR(oleft, 0); ip_msource_tree_RB_SETCOLOR(tmp, 1); do { (oleft) = (tmp )->ims_link.rbe_left; if (((tmp)->ims_link.rbe_left = ( oleft)->ims_link.rbe_right) != ((void *)0)) { ip_msource_tree_RB_SETPARENT ((oleft)->ims_link.rbe_right, (tmp)); } (void)(tmp); if (ip_msource_tree_RB_SETPARENT (oleft, ip_msource_tree_RB_GETPARENT(tmp)) != ((void *)0)) { if ((tmp) == (ip_msource_tree_RB_GETPARENT(tmp))->ims_link.rbe_left ) (ip_msource_tree_RB_GETPARENT(tmp))->ims_link.rbe_left = (oleft); else (ip_msource_tree_RB_GETPARENT(tmp))->ims_link .rbe_right = (oleft); } else (head)->rbh_root = (oleft); ( oleft)->ims_link.rbe_right = (tmp); ip_msource_tree_RB_SETPARENT (tmp, oleft); (void)(oleft); if ((ip_msource_tree_RB_GETPARENT (oleft))) (void)(ip_msource_tree_RB_GETPARENT(oleft)); } while ( 0); tmp = (parent)->ims_link.rbe_right; } ip_msource_tree_RB_SETCOLOR (tmp, (ip_msource_tree_RB_GETCOLOR(parent))); ip_msource_tree_RB_SETCOLOR (parent, 0); if ((tmp)->ims_link.rbe_right) ip_msource_tree_RB_SETCOLOR ((tmp)->ims_link.rbe_right,0); do { (tmp) = (parent)->ims_link .rbe_right; if (((parent)->ims_link.rbe_right = (tmp)-> ims_link.rbe_left) != ((void *)0)) { ip_msource_tree_RB_SETPARENT ((tmp)->ims_link.rbe_left,(parent)); } (void)(parent); if ( ip_msource_tree_RB_SETPARENT(tmp, ip_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_left) (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT (parent))->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_left = (parent); ip_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); elm = (head)->rbh_root; break; } } else { tmp = (parent )->ims_link.rbe_left; if (ip_msource_tree_RB_GETCOLOR(tmp) == 1) { do { ip_msource_tree_RB_SETCOLOR(tmp, 0); ip_msource_tree_RB_SETCOLOR (parent, 1); } while ( 0); do { (tmp) = (parent)->ims_link .rbe_left; if (((parent)->ims_link.rbe_left = (tmp)->ims_link .rbe_right) != ((void *)0)) { ip_msource_tree_RB_SETPARENT((tmp )->ims_link.rbe_right, (parent)); } (void)(parent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left) (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT(parent) )->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_right = (parent); ip_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); tmp = (parent)->ims_link.rbe_left; } if (((tmp)->ims_link .rbe_left == ((void *)0) || ip_msource_tree_RB_GETCOLOR((tmp) ->ims_link.rbe_left) == 0) && ((tmp)->ims_link. rbe_right == ((void *)0) || ip_msource_tree_RB_GETCOLOR((tmp) ->ims_link.rbe_right) == 0)) { ip_msource_tree_RB_SETCOLOR (tmp, 1); elm = parent; parent = ip_msource_tree_RB_GETPARENT (elm); } else { if ((tmp)->ims_link.rbe_left == ((void *)0 ) || ip_msource_tree_RB_GETCOLOR((tmp)->ims_link.rbe_left) == 0) { struct ip_msource *oright; if ((oright = (tmp)->ims_link .rbe_right) != ((void *)0)) ip_msource_tree_RB_SETCOLOR(oright , 0); ip_msource_tree_RB_SETCOLOR(tmp, 1); do { (oright) = (tmp )->ims_link.rbe_right; if (((tmp)->ims_link.rbe_right = (oright)->ims_link.rbe_left) != ((void *)0)) { ip_msource_tree_RB_SETPARENT ((oright)->ims_link.rbe_left,(tmp)); } (void)(tmp); if (ip_msource_tree_RB_SETPARENT (oright, ip_msource_tree_RB_GETPARENT(tmp)) != ((void *)0)) { if ((tmp) == (ip_msource_tree_RB_GETPARENT(tmp))->ims_link .rbe_left) (ip_msource_tree_RB_GETPARENT(tmp))->ims_link.rbe_left = (oright); else (ip_msource_tree_RB_GETPARENT(tmp))->ims_link .rbe_right = (oright); } else (head)->rbh_root = (oright); (oright)->ims_link.rbe_left = (tmp); ip_msource_tree_RB_SETPARENT (tmp, (oright)); (void)(oright); if ((ip_msource_tree_RB_GETPARENT (oright))) (void)(ip_msource_tree_RB_GETPARENT(oright)); } while ( 0); tmp = (parent)->ims_link.rbe_left; } ip_msource_tree_RB_SETCOLOR (tmp,(ip_msource_tree_RB_GETCOLOR(parent))); ip_msource_tree_RB_SETCOLOR (parent, 0); if ((tmp)->ims_link.rbe_left) ip_msource_tree_RB_SETCOLOR ((tmp)->ims_link.rbe_left, 0); do { (tmp) = (parent)->ims_link .rbe_left; if (((parent)->ims_link.rbe_left = (tmp)->ims_link .rbe_right) != ((void *)0)) { ip_msource_tree_RB_SETPARENT((tmp )->ims_link.rbe_right, (parent)); } (void)(parent); if (ip_msource_tree_RB_SETPARENT (tmp, ip_msource_tree_RB_GETPARENT(parent)) != ((void *)0)) { if ((parent) == (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left) (ip_msource_tree_RB_GETPARENT(parent))->ims_link .rbe_left = (tmp); else (ip_msource_tree_RB_GETPARENT(parent) )->ims_link.rbe_right = (tmp); } else (head)->rbh_root = (tmp); (tmp)->ims_link.rbe_right = (parent); ip_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip_msource_tree_RB_GETPARENT (tmp))) (void)(ip_msource_tree_RB_GETPARENT(tmp)); } while ( 0 ); elm = (head)->rbh_root; break; } } } if (elm) ip_msource_tree_RB_SETCOLOR (elm, 0); } struct ip_msource * ip_msource_tree_RB_REMOVE(struct ip_msource_tree *head, struct ip_msource *elm) { struct ip_msource *child, *parent, *old = elm; int color; if ((elm)->ims_link .rbe_left == ((void *)0)) child = (elm)->ims_link.rbe_right ; else if ((elm)->ims_link.rbe_right == ((void *)0)) child = (elm)->ims_link.rbe_left; else { struct ip_msource *left ; elm = (elm)->ims_link.rbe_right; while ((left = (elm)-> ims_link.rbe_left) != ((void *)0)) elm = left; child = (elm)-> ims_link.rbe_right; parent = ip_msource_tree_RB_GETPARENT(elm ); color = ip_msource_tree_RB_GETCOLOR(elm); if (child) ip_msource_tree_RB_SETPARENT (child, parent); if (parent) { if ((parent)->ims_link.rbe_left == elm) (parent)->ims_link.rbe_left = child; else (parent )->ims_link.rbe_right = child; (void)(parent); } else (head )->rbh_root = child; if (ip_msource_tree_RB_GETPARENT(elm) == old) parent = elm; (elm)->ims_link = (old)->ims_link ; if (ip_msource_tree_RB_GETPARENT(old)) { if ((ip_msource_tree_RB_GETPARENT (old))->ims_link.rbe_left == old) (ip_msource_tree_RB_GETPARENT (old))->ims_link.rbe_left = elm; else (ip_msource_tree_RB_GETPARENT (old))->ims_link.rbe_right = elm; (void)(ip_msource_tree_RB_GETPARENT (old)); } else (head)->rbh_root = elm; ip_msource_tree_RB_SETPARENT ((old)->ims_link.rbe_left, elm); if ((old)->ims_link.rbe_right ) ip_msource_tree_RB_SETPARENT((old)->ims_link.rbe_right, elm ); if (parent) { left = parent; do { (void)(left); } while (( left = ip_msource_tree_RB_GETPARENT(left)) != ((void *)0)); } goto color; } parent = ip_msource_tree_RB_GETPARENT(elm); color = ip_msource_tree_RB_GETCOLOR(elm); if (child) ip_msource_tree_RB_SETPARENT (child, parent); if (parent) { if ((parent)->ims_link.rbe_left == elm) (parent)->ims_link.rbe_left = child; else (parent )->ims_link.rbe_right = child; (void)(parent); } else (head )->rbh_root = child; color: if (color == 0) ip_msource_tree_RB_REMOVE_COLOR (head, parent, child); return (old); } struct ip_msource * ip_msource_tree_RB_INSERT (struct ip_msource_tree *head, struct ip_msource *elm) { struct ip_msource *tmp; struct ip_msource *parent = ((void *)0); int comp = 0; tmp = (head)->rbh_root; while (tmp) { parent = tmp ; comp = (ip_msource_cmp)(elm, parent); if (comp < 0) tmp = (tmp)->ims_link.rbe_left; else if (comp > 0) tmp = (tmp )->ims_link.rbe_right; else return (tmp); } do { ip_msource_tree_RB_SETPARENT (elm, parent); (elm)->ims_link.rbe_left = (elm)->ims_link .rbe_right = ((void *)0); ip_msource_tree_RB_SETCOLOR(elm, 1) ; } while ( 0); if (parent != ((void *)0)) { if (comp < 0) (parent)->ims_link.rbe_left = elm; else (parent)->ims_link .rbe_right = elm; (void)(parent); } else (head)->rbh_root = elm; ip_msource_tree_RB_INSERT_COLOR(head, elm); return (((void *)0)); } struct ip_msource * ip_msource_tree_RB_FIND(struct ip_msource_tree *head, struct ip_msource *elm) { struct ip_msource *tmp = (head )->rbh_root; int comp; while (tmp) { comp = ip_msource_cmp (elm, tmp); if (comp < 0) tmp = (tmp)->ims_link.rbe_left ; else if (comp > 0) tmp = (tmp)->ims_link.rbe_right; else return (tmp); } return (((void *)0)); } struct ip_msource * ip_msource_tree_RB_NEXT (struct ip_msource *elm) { if ((elm)->ims_link.rbe_right) { elm = (elm)->ims_link.rbe_right; while ((elm)->ims_link .rbe_left) elm = (elm)->ims_link.rbe_left; } else { if (ip_msource_tree_RB_GETPARENT (elm) && (elm == (ip_msource_tree_RB_GETPARENT(elm))-> ims_link.rbe_left)) elm = ip_msource_tree_RB_GETPARENT(elm); else { while (ip_msource_tree_RB_GETPARENT(elm) && (elm == (ip_msource_tree_RB_GETPARENT(elm))->ims_link.rbe_right)) elm = ip_msource_tree_RB_GETPARENT(elm); elm = ip_msource_tree_RB_GETPARENT (elm); } } return (elm); } struct ip_msource * ip_msource_tree_RB_MINMAX (struct ip_msource_tree *head, int val) { struct ip_msource * tmp = (head)->rbh_root; struct ip_msource *parent = ((void *)0); while (tmp) { parent = tmp; if (val < 0) tmp = (tmp )->ims_link.rbe_left; else tmp = (tmp)->ims_link.rbe_right ; } return (parent); } struct ip_msource * ip_msource_tree_RB_PREV (struct ip_msource *elm) { if ((elm)->ims_link.rbe_left) { elm = (elm)->ims_link.rbe_left; while ((elm)->ims_link .rbe_right) elm = (elm)->ims_link.rbe_right; } else { if ( ip_msource_tree_RB_GETPARENT(elm) && (elm == (ip_msource_tree_RB_GETPARENT (elm))->ims_link.rbe_right)) elm = ip_msource_tree_RB_GETPARENT (elm); else { while (ip_msource_tree_RB_GETPARENT(elm) && (elm == (ip_msource_tree_RB_GETPARENT(elm))->ims_link.rbe_left )) elm = ip_msource_tree_RB_GETPARENT(elm); elm = ip_msource_tree_RB_GETPARENT (elm); } } return (elm); }; | |||
180 | ||||
181 | #define INM_TRACE_HIST_SIZE32 32 /* size of trace history */ | |||
182 | ||||
183 | /* For gdb */ | |||
184 | __private_extern__ unsigned int inm_trace_hist_size = INM_TRACE_HIST_SIZE32; | |||
185 | ||||
186 | struct in_multi_dbg { | |||
187 | struct in_multi inm; /* in_multi */ | |||
188 | u_int16_t inm_refhold_cnt; /* # of ref */ | |||
189 | u_int16_t inm_refrele_cnt; /* # of rele */ | |||
190 | /* | |||
191 | * Circular lists of inm_addref and inm_remref callers. | |||
192 | */ | |||
193 | ctrace_t inm_refhold[INM_TRACE_HIST_SIZE32]; | |||
194 | ctrace_t inm_refrele[INM_TRACE_HIST_SIZE32]; | |||
195 | /* | |||
196 | * Trash list linkage | |||
197 | */ | |||
198 | TAILQ_ENTRY(in_multi_dbg)struct { struct in_multi_dbg *tqe_next; struct in_multi_dbg * *tqe_prev; } inm_trash_link; | |||
199 | }; | |||
200 | ||||
201 | /* List of trash in_multi entries protected by inm_trash_lock */ | |||
202 | static TAILQ_HEAD(, in_multi_dbg)struct { struct in_multi_dbg *tqh_first; struct in_multi_dbg * *tqh_last; } inm_trash_head; | |||
203 | static decl_lck_mtx_data(, inm_trash_lock)lck_mtx_t inm_trash_lock;; | |||
204 | ||||
205 | #define INM_ZONE_MAX64 64 /* maximum elements in zone */ | |||
206 | #define INM_ZONE_NAME"in_multi" "in_multi" /* zone name */ | |||
207 | ||||
208 | #if DEBUG | |||
209 | static unsigned int inm_debug = 1; /* debugging (enabled) */ | |||
210 | #else | |||
211 | static unsigned int inm_debug; /* debugging (disabled) */ | |||
212 | #endif /* !DEBUG */ | |||
213 | static unsigned int inm_size; /* size of zone element */ | |||
214 | static struct zone *inm_zone; /* zone for in_multi */ | |||
215 | ||||
216 | #define IPMS_ZONE_MAX64 64 /* maximum elements in zone */ | |||
217 | #define IPMS_ZONE_NAME"ip_msource" "ip_msource" /* zone name */ | |||
218 | ||||
219 | static unsigned int ipms_size; /* size of zone element */ | |||
220 | static struct zone *ipms_zone; /* zone for ip_msource */ | |||
221 | ||||
222 | #define INMS_ZONE_MAX64 64 /* maximum elements in zone */ | |||
223 | #define INMS_ZONE_NAME"in_msource" "in_msource" /* zone name */ | |||
224 | ||||
225 | static unsigned int inms_size; /* size of zone element */ | |||
226 | static struct zone *inms_zone; /* zone for in_msource */ | |||
227 | ||||
228 | /* Lock group and attribute for in_multihead_lock lock */ | |||
229 | static lck_attr_t *in_multihead_lock_attr; | |||
230 | static lck_grp_t *in_multihead_lock_grp; | |||
231 | static lck_grp_attr_t *in_multihead_lock_grp_attr; | |||
232 | ||||
233 | static decl_lck_rw_data(, in_multihead_lock)lck_rw_t in_multihead_lock;; | |||
234 | struct in_multihead in_multihead; | |||
235 | ||||
236 | static struct in_multi *in_multi_alloc(int); | |||
237 | static void in_multi_free(struct in_multi *); | |||
238 | static void in_multi_attach(struct in_multi *); | |||
239 | static void inm_trace(struct in_multi *, int); | |||
240 | ||||
241 | static struct ip_msource *ipms_alloc(int); | |||
242 | static void ipms_free(struct ip_msource *); | |||
243 | static struct in_msource *inms_alloc(int); | |||
244 | static void inms_free(struct in_msource *); | |||
245 | ||||
246 | static __inline int | |||
247 | ip_msource_cmp(const struct ip_msource *a, const struct ip_msource *b) | |||
248 | { | |||
249 | ||||
250 | if (a->ims_haddr < b->ims_haddr) | |||
251 | return (-1); | |||
252 | if (a->ims_haddr == b->ims_haddr) | |||
253 | return (0); | |||
254 | return (1); | |||
255 | } | |||
256 | ||||
257 | /* | |||
258 | * Inline function which wraps assertions for a valid ifp. | |||
259 | */ | |||
260 | static __inline__ int | |||
261 | inm_is_ifp_detached(const struct in_multi *inm) | |||
262 | { | |||
263 | VERIFY(inm->inm_ifma != NULL)((void)(__builtin_expect(!!((long)((inm->inm_ifma != ((void *)0)))), 1L) || assfail("inm->inm_ifma != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 263))); | |||
264 | VERIFY(inm->inm_ifp == inm->inm_ifma->ifma_ifp)((void)(__builtin_expect(!!((long)((inm->inm_ifp == inm-> inm_ifma->ifma_ifp))), 1L) || assfail("inm->inm_ifp == inm->inm_ifma->ifma_ifp" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 264 ))); | |||
265 | ||||
266 | return (!ifnet_is_attached(inm->inm_ifp, 0)); | |||
267 | } | |||
268 | ||||
269 | /* | |||
270 | * Initialize an in_mfilter structure to a known state at t0, t1 | |||
271 | * with an empty source filter list. | |||
272 | */ | |||
273 | static __inline__ void | |||
274 | imf_init(struct in_mfilter *imf, const int st0, const int st1) | |||
275 | { | |||
276 | memset(imf, 0, sizeof(struct in_mfilter)); | |||
277 | RB_INIT(&imf->imf_sources)do { (&imf->imf_sources)->rbh_root = ((void *)0); } while ( 0); | |||
278 | imf->imf_st[0] = st0; | |||
279 | imf->imf_st[1] = st1; | |||
280 | } | |||
281 | ||||
282 | /* | |||
283 | * Resize the ip_moptions vector to the next power-of-two minus 1. | |||
284 | */ | |||
285 | static int | |||
286 | imo_grow(struct ip_moptions *imo, size_t newmax) | |||
287 | { | |||
288 | struct in_multi **nmships; | |||
289 | struct in_multi **omships; | |||
290 | struct in_mfilter *nmfilters; | |||
291 | struct in_mfilter *omfilters; | |||
292 | size_t idx; | |||
293 | size_t oldmax; | |||
294 | ||||
295 | IMO_LOCK_ASSERT_HELD(imo)lck_mtx_assert(&(imo)->imo_lock, 1); | |||
296 | ||||
297 | nmships = NULL((void *)0); | |||
298 | nmfilters = NULL((void *)0); | |||
299 | omships = imo->imo_membership; | |||
300 | omfilters = imo->imo_mfilters; | |||
301 | oldmax = imo->imo_max_memberships; | |||
302 | if (newmax == 0) | |||
303 | newmax = ((oldmax + 1) * 2) - 1; | |||
304 | ||||
305 | if (newmax > IP_MAX_MEMBERSHIPS4095) | |||
306 | return (ETOOMANYREFS59); | |||
307 | ||||
308 | if ((nmships = (struct in_multi **)_REALLOC(omships,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in_multi *) * newmax, 53 , 0x0000 | 0x0004, &site); }) | |||
309 | sizeof (struct in_multi *) * newmax, M_IPMOPTS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in_multi *) * newmax, 53 , 0x0000 | 0x0004, &site); }) | |||
310 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in_multi *) * newmax, 53 , 0x0000 | 0x0004, &site); })) == NULL((void *)0)) | |||
311 | return (ENOMEM12); | |||
312 | ||||
313 | imo->imo_membership = nmships; | |||
314 | ||||
315 | if ((nmfilters = (struct in_mfilter *)_REALLOC(omfilters,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in_mfilter) * newmax , 110, 0x0000 | 0x0004, &site); }) | |||
316 | sizeof (struct in_mfilter) * newmax, M_INMFILTER,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in_mfilter) * newmax , 110, 0x0000 | 0x0004, &site); }) | |||
317 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in_mfilter) * newmax , 110, 0x0000 | 0x0004, &site); })) == NULL((void *)0)) | |||
318 | return (ENOMEM12); | |||
319 | ||||
320 | imo->imo_mfilters = nmfilters; | |||
321 | ||||
322 | /* Initialize newly allocated source filter heads. */ | |||
323 | for (idx = oldmax; idx < newmax; idx++) | |||
324 | imf_init(&nmfilters[idx], MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
325 | ||||
326 | imo->imo_max_memberships = newmax; | |||
327 | ||||
328 | return (0); | |||
329 | } | |||
330 | ||||
331 | /* | |||
332 | * Find an IPv4 multicast group entry for this ip_moptions instance | |||
333 | * which matches the specified group, and optionally an interface. | |||
334 | * Return its index into the array, or -1 if not found. | |||
335 | */ | |||
336 | static size_t | |||
337 | imo_match_group(const struct ip_moptions *imo, const struct ifnet *ifp, | |||
338 | const struct sockaddr *group) | |||
339 | { | |||
340 | const struct sockaddr_in *gsin; | |||
341 | struct in_multi *pinm; | |||
342 | int idx; | |||
343 | int nmships; | |||
344 | ||||
345 | IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo))lck_mtx_assert(&((struct ip_moptions *) (long)(imo))-> imo_lock, 1); | |||
346 | ||||
347 | gsin = (struct sockaddr_in *)(uintptr_t)(size_t)group; | |||
348 | ||||
349 | /* The imo_membership array may be lazy allocated. */ | |||
350 | if (imo->imo_membership == NULL((void *)0) || imo->imo_num_memberships == 0) | |||
351 | return (-1); | |||
352 | ||||
353 | nmships = imo->imo_num_memberships; | |||
354 | for (idx = 0; idx < nmships; idx++) { | |||
355 | pinm = imo->imo_membership[idx]; | |||
356 | if (pinm == NULL((void *)0)) | |||
357 | continue; | |||
358 | INM_LOCK(pinm)lck_mtx_lock(&(pinm)->inm_lock); | |||
359 | if ((ifp == NULL((void *)0) || (pinm->inm_ifp == ifp)) && | |||
360 | in_hosteq(pinm->inm_addr, gsin->sin_addr)((pinm->inm_addr).s_addr == (gsin->sin_addr).s_addr)) { | |||
361 | INM_UNLOCK(pinm)lck_mtx_unlock(&(pinm)->inm_lock); | |||
362 | break; | |||
363 | } | |||
364 | INM_UNLOCK(pinm)lck_mtx_unlock(&(pinm)->inm_lock); | |||
365 | } | |||
366 | if (idx >= nmships) | |||
367 | idx = -1; | |||
368 | ||||
369 | return (idx); | |||
370 | } | |||
371 | ||||
372 | /* | |||
373 | * Find an IPv4 multicast source entry for this imo which matches | |||
374 | * the given group index for this socket, and source address. | |||
375 | * | |||
376 | * NOTE: This does not check if the entry is in-mode, merely if | |||
377 | * it exists, which may not be the desired behaviour. | |||
378 | */ | |||
379 | static struct in_msource * | |||
380 | imo_match_source(const struct ip_moptions *imo, const size_t gidx, | |||
381 | const struct sockaddr *src) | |||
382 | { | |||
383 | struct ip_msource find; | |||
384 | struct in_mfilter *imf; | |||
385 | struct ip_msource *ims; | |||
386 | const sockunion_t *psa; | |||
387 | ||||
388 | IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo))lck_mtx_assert(&((struct ip_moptions *) (long)(imo))-> imo_lock, 1); | |||
389 | ||||
390 | VERIFY(src->sa_family == AF_INET)((void)(__builtin_expect(!!((long)((src->sa_family == 2))) , 1L) || assfail("src->sa_family == AF_INET", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 390))); | |||
391 | VERIFY(gidx != (size_t)-1 && gidx < imo->imo_num_memberships)((void)(__builtin_expect(!!((long)((gidx != (size_t)-1 && gidx < imo->imo_num_memberships))), 1L) || assfail("gidx != (size_t)-1 && gidx < imo->imo_num_memberships" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 391 ))); | |||
392 | ||||
393 | /* The imo_mfilters array may be lazy allocated. */ | |||
394 | if (imo->imo_mfilters == NULL((void *)0)) | |||
395 | return (NULL((void *)0)); | |||
396 | imf = &imo->imo_mfilters[gidx]; | |||
397 | ||||
398 | /* Source trees are keyed in host byte order. */ | |||
399 | psa = (sockunion_t *)(uintptr_t)(size_t)src; | |||
400 | find.ims_haddr = ntohl(psa->sin.sin_addr.s_addr)(__builtin_constant_p(psa->sin.sin_addr.s_addr) ? ((__uint32_t )((((__uint32_t)(psa->sin.sin_addr.s_addr) & 0xff000000 ) >> 24) | (((__uint32_t)(psa->sin.sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t)(psa->sin.sin_addr .s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(psa-> sin.sin_addr.s_addr) & 0x000000ff) << 24))) : _OSSwapInt32 (psa->sin.sin_addr.s_addr)); | |||
401 | ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find)ip_msource_tree_RB_FIND(&imf->imf_sources, &find); | |||
402 | ||||
403 | return ((struct in_msource *)ims); | |||
404 | } | |||
405 | ||||
406 | /* | |||
407 | * Perform filtering for multicast datagrams on a socket by group and source. | |||
408 | * | |||
409 | * Returns 0 if a datagram should be allowed through, or various error codes | |||
410 | * if the socket was not a member of the group, or the source was muted, etc. | |||
411 | */ | |||
412 | int | |||
413 | imo_multi_filter(const struct ip_moptions *imo, const struct ifnet *ifp, | |||
414 | const struct sockaddr *group, const struct sockaddr *src) | |||
415 | { | |||
416 | size_t gidx; | |||
417 | struct in_msource *ims; | |||
418 | int mode; | |||
419 | ||||
420 | IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo))lck_mtx_assert(&((struct ip_moptions *) (long)(imo))-> imo_lock, 1); | |||
421 | VERIFY(ifp != NULL)((void)(__builtin_expect(!!((long)((ifp != ((void *)0)))), 1L ) || assfail("ifp != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 421))); | |||
422 | ||||
423 | gidx = imo_match_group(imo, ifp, group); | |||
424 | if (gidx == (size_t)-1) | |||
425 | return (MCAST_NOTGMEMBER1); | |||
426 | ||||
427 | /* | |||
428 | * Check if the source was included in an (S,G) join. | |||
429 | * Allow reception on exclusive memberships by default, | |||
430 | * reject reception on inclusive memberships by default. | |||
431 | * Exclude source only if an in-mode exclude filter exists. | |||
432 | * Include source only if an in-mode include filter exists. | |||
433 | * NOTE: We are comparing group state here at IGMP t1 (now) | |||
434 | * with socket-layer t0 (since last downcall). | |||
435 | */ | |||
436 | mode = imo->imo_mfilters[gidx].imf_st[1]; | |||
437 | ims = imo_match_source(imo, gidx, src); | |||
438 | ||||
439 | if ((ims == NULL((void *)0) && mode == MCAST_INCLUDE1) || | |||
440 | (ims != NULL((void *)0) && ims->imsl_st[0] != mode)) { | |||
441 | return (MCAST_NOTSMEMBER2); | |||
442 | } | |||
443 | ||||
444 | return (MCAST_PASS0); | |||
445 | } | |||
446 | ||||
447 | int | |||
448 | imo_clone(struct inpcb *from_inp, struct inpcb *to_inp) | |||
449 | { | |||
450 | int i, err = 0; | |||
451 | struct ip_moptions *from; | |||
452 | struct ip_moptions *to; | |||
453 | ||||
454 | from = inp_findmoptions(from_inp); | |||
455 | if (from == NULL((void *)0)) | |||
456 | return (ENOMEM12); | |||
457 | ||||
458 | to = inp_findmoptions(to_inp); | |||
459 | if (to == NULL((void *)0)) { | |||
460 | IMO_REMREF(from)imo_remref(from); | |||
461 | return (ENOMEM12); | |||
462 | } | |||
463 | ||||
464 | IMO_LOCK(from)lck_mtx_lock(&(from)->imo_lock); | |||
465 | IMO_LOCK(to)lck_mtx_lock(&(to)->imo_lock); | |||
466 | ||||
467 | to->imo_multicast_ifp = from->imo_multicast_ifp; | |||
468 | to->imo_multicast_vif = from->imo_multicast_vif; | |||
469 | to->imo_multicast_ttl = from->imo_multicast_ttl; | |||
470 | to->imo_multicast_loop = from->imo_multicast_loop; | |||
471 | ||||
472 | /* | |||
473 | * We're cloning, so drop any existing memberships and source | |||
474 | * filters on the destination ip_moptions. | |||
475 | */ | |||
476 | for (i = 0; i < to->imo_num_memberships; ++i) { | |||
477 | struct in_mfilter *imf; | |||
478 | ||||
479 | imf = to->imo_mfilters ? &to->imo_mfilters[i] : NULL((void *)0); | |||
480 | if (imf != NULL((void *)0)) | |||
481 | imf_leave(imf); | |||
482 | ||||
483 | (void) in_leavegroup(to->imo_membership[i], imf); | |||
484 | ||||
485 | if (imf != NULL((void *)0)) | |||
486 | imf_purge(imf); | |||
487 | ||||
488 | INM_REMREF(to->imo_membership[i])inm_remref(to->imo_membership[i], 0); | |||
489 | to->imo_membership[i] = NULL((void *)0); | |||
490 | } | |||
491 | to->imo_num_memberships = 0; | |||
492 | ||||
493 | VERIFY(to->imo_max_memberships != 0 && from->imo_max_memberships != 0)((void)(__builtin_expect(!!((long)((to->imo_max_memberships != 0 && from->imo_max_memberships != 0))), 1L) || assfail("to->imo_max_memberships != 0 && from->imo_max_memberships != 0" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 493 ))); | |||
494 | if (to->imo_max_memberships < from->imo_max_memberships) { | |||
495 | /* | |||
496 | * Ensure source and destination ip_moptions memberships | |||
497 | * and source filters arrays are at least equal in size. | |||
498 | */ | |||
499 | err = imo_grow(to, from->imo_max_memberships); | |||
500 | if (err != 0) | |||
501 | goto done; | |||
502 | } | |||
503 | VERIFY(to->imo_max_memberships >= from->imo_max_memberships)((void)(__builtin_expect(!!((long)((to->imo_max_memberships >= from->imo_max_memberships))), 1L) || assfail("to->imo_max_memberships >= from->imo_max_memberships" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 503 ))); | |||
504 | ||||
505 | /* | |||
506 | * Source filtering doesn't apply to OpenTransport socket, | |||
507 | * so simply hold additional reference count per membership. | |||
508 | */ | |||
509 | for (i = 0; i < from->imo_num_memberships; i++) { | |||
510 | to->imo_membership[i] = | |||
511 | in_addmulti(&from->imo_membership[i]->inm_addr, | |||
512 | from->imo_membership[i]->inm_ifp); | |||
513 | if (to->imo_membership[i] == NULL((void *)0)) | |||
514 | break; | |||
515 | to->imo_num_memberships++; | |||
516 | } | |||
517 | VERIFY(to->imo_num_memberships == from->imo_num_memberships)((void)(__builtin_expect(!!((long)((to->imo_num_memberships == from->imo_num_memberships))), 1L) || assfail("to->imo_num_memberships == from->imo_num_memberships" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 517 ))); | |||
518 | ||||
519 | done: | |||
520 | IMO_UNLOCK(to)lck_mtx_unlock(&(to)->imo_lock); | |||
521 | IMO_REMREF(to)imo_remref(to); | |||
522 | IMO_UNLOCK(from)lck_mtx_unlock(&(from)->imo_lock); | |||
523 | IMO_REMREF(from)imo_remref(from); | |||
524 | ||||
525 | return (err); | |||
526 | } | |||
527 | ||||
528 | /* | |||
529 | * Find and return a reference to an in_multi record for (ifp, group), | |||
530 | * and bump its reference count. | |||
531 | * If one does not exist, try to allocate it, and update link-layer multicast | |||
532 | * filters on ifp to listen for group. | |||
533 | * Return 0 if successful, otherwise return an appropriate error code. | |||
534 | */ | |||
535 | static int | |||
536 | in_getmulti(struct ifnet *ifp, const struct in_addr *group, | |||
537 | struct in_multi **pinm) | |||
538 | { | |||
539 | struct sockaddr_in gsin; | |||
540 | struct ifmultiaddr *ifma; | |||
541 | struct in_multi *inm; | |||
542 | int error; | |||
543 | ||||
544 | in_multihead_lock_shared(); | |||
545 | IN_LOOKUP_MULTI(group, ifp, inm)do { struct in_multistep _step; do { in_multihead_lock_assert (0x03); (_step).i_inm = ((&in_multihead)->lh_first); do { in_multihead_lock_assert(0x03); if ((((inm)) = ((_step)).i_inm ) != ((void *)0)) ((_step)).i_inm = ((((_step)).i_inm)->inm_link .le_next); } while (0); } while (0); while ((inm) != ((void * )0)) { lck_mtx_lock_spin(&(inm)->inm_lock); if ((inm)-> inm_ifp == (ifp) && (inm)->inm_addr.s_addr == (group )->s_addr) { inm_addref(inm, 1); lck_mtx_unlock(&(inm) ->inm_lock); break; } lck_mtx_unlock(&(inm)->inm_lock ); do { in_multihead_lock_assert(0x03); if (((inm) = (_step). i_inm) != ((void *)0)) (_step).i_inm = (((_step).i_inm)->inm_link .le_next); } while (0); } } while (0); | |||
546 | if (inm != NULL((void *)0)) { | |||
547 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
548 | VERIFY(inm->inm_reqcnt >= 1)((void)(__builtin_expect(!!((long)((inm->inm_reqcnt >= 1 ))), 1L) || assfail("inm->inm_reqcnt >= 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 548))); | |||
549 | inm->inm_reqcnt++; | |||
550 | VERIFY(inm->inm_reqcnt != 0)((void)(__builtin_expect(!!((long)((inm->inm_reqcnt != 0)) ), 1L) || assfail("inm->inm_reqcnt != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 550))); | |||
551 | *pinm = inm; | |||
552 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
553 | in_multihead_lock_done(); | |||
554 | /* | |||
555 | * We already joined this group; return the inm | |||
556 | * with a refcount held (via lookup) for caller. | |||
557 | */ | |||
558 | return (0); | |||
559 | } | |||
560 | in_multihead_lock_done(); | |||
561 | ||||
562 | bzero(&gsin, sizeof(gsin)); | |||
563 | gsin.sin_family = AF_INET2; | |||
564 | gsin.sin_len = sizeof(struct sockaddr_in); | |||
565 | gsin.sin_addr = *group; | |||
566 | ||||
567 | /* | |||
568 | * Check if a link-layer group is already associated | |||
569 | * with this network-layer group on the given ifnet. | |||
570 | */ | |||
571 | error = if_addmulti(ifp, (struct sockaddr *)&gsin, &ifma); | |||
572 | if (error != 0) | |||
573 | return (error); | |||
574 | ||||
575 | /* | |||
576 | * See comments in inm_remref() for access to ifma_protospec. | |||
577 | */ | |||
578 | in_multihead_lock_exclusive(); | |||
579 | IFMA_LOCK(ifma)lck_mtx_lock(&(ifma)->ifma_lock); | |||
580 | if ((inm = ifma->ifma_protospec) != NULL((void *)0)) { | |||
581 | VERIFY(ifma->ifma_addr != NULL)((void)(__builtin_expect(!!((long)((ifma->ifma_addr != ((void *)0)))), 1L) || assfail("ifma->ifma_addr != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 581))); | |||
582 | VERIFY(ifma->ifma_addr->sa_family == AF_INET)((void)(__builtin_expect(!!((long)((ifma->ifma_addr->sa_family == 2))), 1L) || assfail("ifma->ifma_addr->sa_family == AF_INET" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 582 ))); | |||
583 | INM_ADDREF(inm)inm_addref(inm, 0); /* for caller */ | |||
584 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
585 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
586 | VERIFY(inm->inm_ifma == ifma)((void)(__builtin_expect(!!((long)((inm->inm_ifma == ifma) )), 1L) || assfail("inm->inm_ifma == ifma", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 586))); | |||
587 | VERIFY(inm->inm_ifp == ifp)((void)(__builtin_expect(!!((long)((inm->inm_ifp == ifp))) , 1L) || assfail("inm->inm_ifp == ifp", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 587))); | |||
588 | VERIFY(in_hosteq(inm->inm_addr, *group))((void)(__builtin_expect(!!((long)((((inm->inm_addr).s_addr == (*group).s_addr)))), 1L) || assfail("in_hosteq(inm->inm_addr, *group)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 588 ))); | |||
589 | if (inm->inm_debug & IFD_ATTACHED0x1) { | |||
590 | VERIFY(inm->inm_reqcnt >= 1)((void)(__builtin_expect(!!((long)((inm->inm_reqcnt >= 1 ))), 1L) || assfail("inm->inm_reqcnt >= 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 590))); | |||
591 | inm->inm_reqcnt++; | |||
592 | VERIFY(inm->inm_reqcnt != 0)((void)(__builtin_expect(!!((long)((inm->inm_reqcnt != 0)) ), 1L) || assfail("inm->inm_reqcnt != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 592))); | |||
593 | *pinm = inm; | |||
594 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
595 | in_multihead_lock_done(); | |||
596 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
597 | /* | |||
598 | * We lost the race with another thread doing | |||
599 | * in_getmulti(); since this group has already | |||
600 | * been joined; return the inm with a refcount | |||
601 | * held for caller. | |||
602 | */ | |||
603 | return (0); | |||
604 | } | |||
605 | /* | |||
606 | * We lost the race with another thread doing in_delmulti(); | |||
607 | * the inm referring to the ifma has been detached, thus we | |||
608 | * reattach it back to the in_multihead list and return the | |||
609 | * inm with a refcount held for the caller. | |||
610 | */ | |||
611 | in_multi_attach(inm); | |||
612 | VERIFY((inm->inm_debug &((void)(__builtin_expect(!!((long)(((inm->inm_debug & ( 0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->inm_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 613 ))) | |||
613 | (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED)((void)(__builtin_expect(!!((long)(((inm->inm_debug & ( 0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->inm_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 613 ))); | |||
614 | *pinm = inm; | |||
615 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
616 | in_multihead_lock_done(); | |||
617 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
618 | return (0); | |||
619 | } | |||
620 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
621 | ||||
622 | /* | |||
623 | * A new in_multi record is needed; allocate and initialize it. | |||
624 | * We DO NOT perform an IGMP join as the in_ layer may need to | |||
625 | * push an initial source list down to IGMP to support SSM. | |||
626 | * | |||
627 | * The initial source filter state is INCLUDE, {} as per the RFC. | |||
628 | */ | |||
629 | inm = in_multi_alloc(M_WAITOK0x0000); | |||
630 | if (inm == NULL((void *)0)) { | |||
631 | in_multihead_lock_done(); | |||
632 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
633 | return (ENOMEM12); | |||
634 | } | |||
635 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
636 | inm->inm_addr = *group; | |||
637 | inm->inm_ifp = ifp; | |||
638 | inm->inm_igi = IGMP_IFINFO(ifp)((ifp)->if_igi); | |||
639 | VERIFY(inm->inm_igi != NULL)((void)(__builtin_expect(!!((long)((inm->inm_igi != ((void *)0)))), 1L) || assfail("inm->inm_igi != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 639))); | |||
640 | IGI_ADDREF(inm->inm_igi)igi_addref(inm->inm_igi, 0); | |||
641 | inm->inm_ifma = ifma; /* keep refcount from if_addmulti() */ | |||
642 | inm->inm_state = IGMP_NOT_MEMBER0; | |||
643 | /* | |||
644 | * Pending state-changes per group are subject to a bounds check. | |||
645 | */ | |||
646 | inm->inm_scq.ifq_maxlen = IGMP_MAX_STATE_CHANGES24; | |||
647 | inm->inm_st[0].iss_fmode = MCAST_UNDEFINED0; | |||
648 | inm->inm_st[1].iss_fmode = MCAST_UNDEFINED0; | |||
649 | RB_INIT(&inm->inm_srcs)do { (&inm->inm_srcs)->rbh_root = ((void *)0); } while ( 0); | |||
650 | *pinm = inm; | |||
651 | in_multi_attach(inm); | |||
652 | VERIFY((inm->inm_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED)((void)(__builtin_expect(!!((long)(((inm->inm_debug & ( 0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->inm_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 652 ))); | |||
653 | INM_ADDREF_LOCKED(inm)inm_addref(inm, 1); /* for caller */ | |||
654 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
655 | ||||
656 | IFMA_LOCK(ifma)lck_mtx_lock(&(ifma)->ifma_lock); | |||
657 | VERIFY(ifma->ifma_protospec == NULL)((void)(__builtin_expect(!!((long)((ifma->ifma_protospec == ((void *)0)))), 1L) || assfail("ifma->ifma_protospec == NULL" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 657 ))); | |||
658 | ifma->ifma_protospec = inm; | |||
659 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
660 | in_multihead_lock_done(); | |||
661 | ||||
662 | return (0); | |||
663 | } | |||
664 | ||||
665 | /* | |||
666 | * Clear recorded source entries for a group. | |||
667 | * Used by the IGMP code. | |||
668 | * FIXME: Should reap. | |||
669 | */ | |||
670 | void | |||
671 | inm_clear_recorded(struct in_multi *inm) | |||
672 | { | |||
673 | struct ip_msource *ims; | |||
674 | ||||
675 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
676 | ||||
677 | RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs)for ((ims) = ip_msource_tree_RB_MINMAX(&inm->inm_srcs, -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT(ims )) { | |||
678 | if (ims->ims_stp) { | |||
679 | ims->ims_stp = 0; | |||
680 | --inm->inm_st[1].iss_rec; | |||
681 | } | |||
682 | } | |||
683 | VERIFY(inm->inm_st[1].iss_rec == 0)((void)(__builtin_expect(!!((long)((inm->inm_st[1].iss_rec == 0))), 1L) || assfail("inm->inm_st[1].iss_rec == 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 683))); | |||
684 | } | |||
685 | ||||
686 | /* | |||
687 | * Record a source as pending for a Source-Group IGMPv3 query. | |||
688 | * This lives here as it modifies the shared tree. | |||
689 | * | |||
690 | * inm is the group descriptor. | |||
691 | * naddr is the address of the source to record in network-byte order. | |||
692 | * | |||
693 | * If the net.inet.igmp.sgalloc sysctl is non-zero, we will | |||
694 | * lazy-allocate a source node in response to an SG query. | |||
695 | * Otherwise, no allocation is performed. This saves some memory | |||
696 | * with the trade-off that the source will not be reported to the | |||
697 | * router if joined in the window between the query response and | |||
698 | * the group actually being joined on the local host. | |||
699 | * | |||
700 | * Return 0 if the source didn't exist or was already marked as recorded. | |||
701 | * Return 1 if the source was marked as recorded by this function. | |||
702 | * Return <0 if any error occured (negated errno code). | |||
703 | */ | |||
704 | int | |||
705 | inm_record_source(struct in_multi *inm, const in_addr_t naddr) | |||
706 | { | |||
707 | struct ip_msource find; | |||
708 | struct ip_msource *ims, *nims; | |||
709 | ||||
710 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
711 | ||||
712 | find.ims_haddr = ntohl(naddr)(__builtin_constant_p(naddr) ? ((__uint32_t)((((__uint32_t)(naddr ) & 0xff000000) >> 24) | (((__uint32_t)(naddr) & 0x00ff0000) >> 8) | (((__uint32_t)(naddr) & 0x0000ff00 ) << 8) | (((__uint32_t)(naddr) & 0x000000ff) << 24))) : _OSSwapInt32(naddr)); | |||
713 | ims = RB_FIND(ip_msource_tree, &inm->inm_srcs, &find)ip_msource_tree_RB_FIND(&inm->inm_srcs, &find); | |||
714 | if (ims && ims->ims_stp) | |||
715 | return (0); | |||
716 | if (ims == NULL((void *)0)) { | |||
717 | if (inm->inm_nsrc == in_mcast_maxgrpsrc) | |||
718 | return (-ENOSPC28); | |||
719 | nims = ipms_alloc(M_WAITOK0x0000); | |||
720 | if (nims == NULL((void *)0)) | |||
721 | return (-ENOMEM12); | |||
722 | nims->ims_haddr = find.ims_haddr; | |||
723 | RB_INSERT(ip_msource_tree, &inm->inm_srcs, nims)ip_msource_tree_RB_INSERT(&inm->inm_srcs, nims); | |||
724 | ++inm->inm_nsrc; | |||
725 | ims = nims; | |||
726 | } | |||
727 | ||||
728 | /* | |||
729 | * Mark the source as recorded and update the recorded | |||
730 | * source count. | |||
731 | */ | |||
732 | ++ims->ims_stp; | |||
733 | ++inm->inm_st[1].iss_rec; | |||
734 | ||||
735 | return (1); | |||
736 | } | |||
737 | ||||
738 | /* | |||
739 | * Return a pointer to an in_msource owned by an in_mfilter, | |||
740 | * given its source address. | |||
741 | * Lazy-allocate if needed. If this is a new entry its filter state is | |||
742 | * undefined at t0. | |||
743 | * | |||
744 | * imf is the filter set being modified. | |||
745 | * haddr is the source address in *host* byte-order. | |||
746 | * | |||
747 | * Caller is expected to be holding imo_lock. | |||
748 | */ | |||
749 | static int | |||
750 | imf_get_source(struct in_mfilter *imf, const struct sockaddr_in *psin, | |||
751 | struct in_msource **plims) | |||
752 | { | |||
753 | struct ip_msource find; | |||
754 | struct ip_msource *ims; | |||
755 | struct in_msource *lims; | |||
756 | int error; | |||
757 | ||||
758 | error = 0; | |||
759 | ims = NULL((void *)0); | |||
760 | lims = NULL((void *)0); | |||
761 | ||||
762 | /* key is host byte order */ | |||
763 | find.ims_haddr = ntohl(psin->sin_addr.s_addr)(__builtin_constant_p(psin->sin_addr.s_addr) ? ((__uint32_t )((((__uint32_t)(psin->sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x00ff0000 ) >> 8) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(psin->sin_addr.s_addr ) & 0x000000ff) << 24))) : _OSSwapInt32(psin->sin_addr .s_addr)); | |||
764 | ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find)ip_msource_tree_RB_FIND(&imf->imf_sources, &find); | |||
765 | lims = (struct in_msource *)ims; | |||
766 | if (lims == NULL((void *)0)) { | |||
767 | if (imf->imf_nsrc == in_mcast_maxsocksrc) | |||
768 | return (ENOSPC28); | |||
769 | lims = inms_alloc(M_WAITOK0x0000); | |||
770 | if (lims == NULL((void *)0)) | |||
771 | return (ENOMEM12); | |||
772 | lims->ims_haddr = find.ims_haddr; | |||
773 | lims->imsl_st[0] = MCAST_UNDEFINED0; | |||
774 | RB_INSERT(ip_msource_tree, &imf->imf_sources,ip_msource_tree_RB_INSERT(&imf->imf_sources, (struct ip_msource *)lims) | |||
775 | (struct ip_msource *)lims)ip_msource_tree_RB_INSERT(&imf->imf_sources, (struct ip_msource *)lims); | |||
776 | ++imf->imf_nsrc; | |||
777 | } | |||
778 | ||||
779 | *plims = lims; | |||
780 | ||||
781 | return (error); | |||
782 | } | |||
783 | ||||
784 | /* | |||
785 | * Graft a source entry into an existing socket-layer filter set, | |||
786 | * maintaining any required invariants and checking allocations. | |||
787 | * | |||
788 | * The source is marked as being in the new filter mode at t1. | |||
789 | * | |||
790 | * Return the pointer to the new node, otherwise return NULL. | |||
791 | * | |||
792 | * Caller is expected to be holding imo_lock. | |||
793 | */ | |||
794 | static struct in_msource * | |||
795 | imf_graft(struct in_mfilter *imf, const uint8_t st1, | |||
796 | const struct sockaddr_in *psin) | |||
797 | { | |||
798 | struct in_msource *lims; | |||
799 | ||||
800 | lims = inms_alloc(M_WAITOK0x0000); | |||
801 | if (lims == NULL((void *)0)) | |||
802 | return (NULL((void *)0)); | |||
803 | lims->ims_haddr = ntohl(psin->sin_addr.s_addr)(__builtin_constant_p(psin->sin_addr.s_addr) ? ((__uint32_t )((((__uint32_t)(psin->sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x00ff0000 ) >> 8) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(psin->sin_addr.s_addr ) & 0x000000ff) << 24))) : _OSSwapInt32(psin->sin_addr .s_addr)); | |||
804 | lims->imsl_st[0] = MCAST_UNDEFINED0; | |||
805 | lims->imsl_st[1] = st1; | |||
806 | RB_INSERT(ip_msource_tree, &imf->imf_sources,ip_msource_tree_RB_INSERT(&imf->imf_sources, (struct ip_msource *)lims) | |||
807 | (struct ip_msource *)lims)ip_msource_tree_RB_INSERT(&imf->imf_sources, (struct ip_msource *)lims); | |||
808 | ++imf->imf_nsrc; | |||
809 | ||||
810 | return (lims); | |||
811 | } | |||
812 | ||||
813 | /* | |||
814 | * Prune a source entry from an existing socket-layer filter set, | |||
815 | * maintaining any required invariants and checking allocations. | |||
816 | * | |||
817 | * The source is marked as being left at t1, it is not freed. | |||
818 | * | |||
819 | * Return 0 if no error occurred, otherwise return an errno value. | |||
820 | * | |||
821 | * Caller is expected to be holding imo_lock. | |||
822 | */ | |||
823 | static int | |||
824 | imf_prune(struct in_mfilter *imf, const struct sockaddr_in *psin) | |||
825 | { | |||
826 | struct ip_msource find; | |||
827 | struct ip_msource *ims; | |||
828 | struct in_msource *lims; | |||
829 | ||||
830 | /* key is host byte order */ | |||
831 | find.ims_haddr = ntohl(psin->sin_addr.s_addr)(__builtin_constant_p(psin->sin_addr.s_addr) ? ((__uint32_t )((((__uint32_t)(psin->sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x00ff0000 ) >> 8) | (((__uint32_t)(psin->sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(psin->sin_addr.s_addr ) & 0x000000ff) << 24))) : _OSSwapInt32(psin->sin_addr .s_addr)); | |||
832 | ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find)ip_msource_tree_RB_FIND(&imf->imf_sources, &find); | |||
833 | if (ims == NULL((void *)0)) | |||
834 | return (ENOENT2); | |||
835 | lims = (struct in_msource *)ims; | |||
836 | lims->imsl_st[1] = MCAST_UNDEFINED0; | |||
837 | return (0); | |||
838 | } | |||
839 | ||||
840 | /* | |||
841 | * Revert socket-layer filter set deltas at t1 to t0 state. | |||
842 | * | |||
843 | * Caller is expected to be holding imo_lock. | |||
844 | */ | |||
845 | static void | |||
846 | imf_rollback(struct in_mfilter *imf) | |||
847 | { | |||
848 | struct ip_msource *ims, *tims; | |||
849 | struct in_msource *lims; | |||
850 | ||||
851 | RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
852 | lims = (struct in_msource *)ims; | |||
853 | if (lims->imsl_st[0] == lims->imsl_st[1]) { | |||
854 | /* no change at t1 */ | |||
855 | continue; | |||
856 | } else if (lims->imsl_st[0] != MCAST_UNDEFINED0) { | |||
857 | /* revert change to existing source at t1 */ | |||
858 | lims->imsl_st[1] = lims->imsl_st[0]; | |||
859 | } else { | |||
860 | /* revert source added t1 */ | |||
861 | IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
862 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
863 | RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims)ip_msource_tree_RB_REMOVE(&imf->imf_sources, ims); | |||
864 | inms_free(lims); | |||
865 | imf->imf_nsrc--; | |||
866 | } | |||
867 | } | |||
868 | imf->imf_st[1] = imf->imf_st[0]; | |||
869 | } | |||
870 | ||||
871 | /* | |||
872 | * Mark socket-layer filter set as INCLUDE {} at t1. | |||
873 | * | |||
874 | * Caller is expected to be holding imo_lock. | |||
875 | */ | |||
876 | void | |||
877 | imf_leave(struct in_mfilter *imf) | |||
878 | { | |||
879 | struct ip_msource *ims; | |||
880 | struct in_msource *lims; | |||
881 | ||||
882 | RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT( ims)) { | |||
883 | lims = (struct in_msource *)ims; | |||
884 | lims->imsl_st[1] = MCAST_UNDEFINED0; | |||
885 | } | |||
886 | imf->imf_st[1] = MCAST_INCLUDE1; | |||
887 | } | |||
888 | ||||
889 | /* | |||
890 | * Mark socket-layer filter set deltas as committed. | |||
891 | * | |||
892 | * Caller is expected to be holding imo_lock. | |||
893 | */ | |||
894 | static void | |||
895 | imf_commit(struct in_mfilter *imf) | |||
896 | { | |||
897 | struct ip_msource *ims; | |||
898 | struct in_msource *lims; | |||
899 | ||||
900 | RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT( ims)) { | |||
901 | lims = (struct in_msource *)ims; | |||
902 | lims->imsl_st[0] = lims->imsl_st[1]; | |||
903 | } | |||
904 | imf->imf_st[0] = imf->imf_st[1]; | |||
905 | } | |||
906 | ||||
907 | /* | |||
908 | * Reap unreferenced sources from socket-layer filter set. | |||
909 | * | |||
910 | * Caller is expected to be holding imo_lock. | |||
911 | */ | |||
912 | static void | |||
913 | imf_reap(struct in_mfilter *imf) | |||
914 | { | |||
915 | struct ip_msource *ims, *tims; | |||
916 | struct in_msource *lims; | |||
917 | ||||
918 | RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
919 | lims = (struct in_msource *)ims; | |||
920 | if ((lims->imsl_st[0] == MCAST_UNDEFINED0) && | |||
921 | (lims->imsl_st[1] == MCAST_UNDEFINED0)) { | |||
922 | IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
923 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
924 | RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims)ip_msource_tree_RB_REMOVE(&imf->imf_sources, ims); | |||
925 | inms_free(lims); | |||
926 | imf->imf_nsrc--; | |||
927 | } | |||
928 | } | |||
929 | } | |||
930 | ||||
931 | /* | |||
932 | * Purge socket-layer filter set. | |||
933 | * | |||
934 | * Caller is expected to be holding imo_lock. | |||
935 | */ | |||
936 | void | |||
937 | imf_purge(struct in_mfilter *imf) | |||
938 | { | |||
939 | struct ip_msource *ims, *tims; | |||
940 | struct in_msource *lims; | |||
941 | ||||
942 | RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
943 | lims = (struct in_msource *)ims; | |||
944 | IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
945 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (igmp_debug) printf ("%s: free inms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
946 | RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims)ip_msource_tree_RB_REMOVE(&imf->imf_sources, ims); | |||
947 | inms_free(lims); | |||
948 | imf->imf_nsrc--; | |||
949 | } | |||
950 | imf->imf_st[0] = imf->imf_st[1] = MCAST_UNDEFINED0; | |||
951 | VERIFY(RB_EMPTY(&imf->imf_sources))((void)(__builtin_expect(!!((long)((((&imf->imf_sources )->rbh_root == ((void *)0))))), 1L) || assfail("RB_EMPTY(&imf->imf_sources)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 951 ))); | |||
952 | } | |||
953 | ||||
954 | /* | |||
955 | * Look up a source filter entry for a multicast group. | |||
956 | * | |||
957 | * inm is the group descriptor to work with. | |||
958 | * haddr is the host-byte-order IPv4 address to look up. | |||
959 | * noalloc may be non-zero to suppress allocation of sources. | |||
960 | * *pims will be set to the address of the retrieved or allocated source. | |||
961 | * | |||
962 | * Return 0 if successful, otherwise return a non-zero error code. | |||
963 | */ | |||
964 | static int | |||
965 | inm_get_source(struct in_multi *inm, const in_addr_t haddr, | |||
966 | const int noalloc, struct ip_msource **pims) | |||
967 | { | |||
968 | struct ip_msource find; | |||
969 | struct ip_msource *ims, *nims; | |||
970 | #ifdef IGMP_DEBUG1 | |||
971 | struct in_addr ia; | |||
972 | char buf[MAX_IPv4_STR_LEN16]; | |||
973 | #endif | |||
974 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
975 | ||||
976 | find.ims_haddr = haddr; | |||
977 | ims = RB_FIND(ip_msource_tree, &inm->inm_srcs, &find)ip_msource_tree_RB_FIND(&inm->inm_srcs, &find); | |||
978 | if (ims == NULL((void *)0) && !noalloc) { | |||
979 | if (inm->inm_nsrc == in_mcast_maxgrpsrc) | |||
980 | return (ENOSPC28); | |||
981 | nims = ipms_alloc(M_WAITOK0x0000); | |||
982 | if (nims == NULL((void *)0)) | |||
983 | return (ENOMEM12); | |||
984 | nims->ims_haddr = haddr; | |||
985 | RB_INSERT(ip_msource_tree, &inm->inm_srcs, nims)ip_msource_tree_RB_INSERT(&inm->inm_srcs, nims); | |||
986 | ++inm->inm_nsrc; | |||
987 | ims = nims; | |||
988 | #ifdef IGMP_DEBUG1 | |||
989 | ia.s_addr = htonl(haddr)(__builtin_constant_p(haddr) ? ((__uint32_t)((((__uint32_t)(haddr ) & 0xff000000) >> 24) | (((__uint32_t)(haddr) & 0x00ff0000) >> 8) | (((__uint32_t)(haddr) & 0x0000ff00 ) << 8) | (((__uint32_t)(haddr) & 0x000000ff) << 24))) : _OSSwapInt32(haddr)); | |||
990 | inet_ntop(AF_INET2, &ia, buf, sizeof(buf)); | |||
991 | IGMP_PRINTF(("%s: allocated %s as 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: allocated %s as 0x%llx\n", __func__ , buf, (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0 ) : (vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
992 | buf, (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (igmp_debug) printf ("%s: allocated %s as 0x%llx\n", __func__ , buf, (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0 ) : (vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
993 | #endif | |||
994 | } | |||
995 | ||||
996 | *pims = ims; | |||
997 | return (0); | |||
998 | } | |||
999 | ||||
1000 | /* | |||
1001 | * Helper function to derive the filter mode on a source entry | |||
1002 | * from its internal counters. Predicates are: | |||
1003 | * A source is only excluded if all listeners exclude it. | |||
1004 | * A source is only included if no listeners exclude it, | |||
1005 | * and at least one listener includes it. | |||
1006 | * May be used by ifmcstat(8). | |||
1007 | */ | |||
1008 | uint8_t | |||
1009 | ims_get_mode(const struct in_multi *inm, const struct ip_msource *ims, | |||
1010 | uint8_t t) | |||
1011 | { | |||
1012 | INM_LOCK_ASSERT_HELD(__DECONST(struct in_multi *, inm))lck_mtx_assert(&((struct in_multi *) (long)(inm))->inm_lock , 1); | |||
1013 | ||||
1014 | t = !!t; | |||
1015 | if (inm->inm_st[t].iss_ex > 0 && | |||
1016 | inm->inm_st[t].iss_ex == ims->ims_st[t].ex) | |||
1017 | return (MCAST_EXCLUDE2); | |||
1018 | else if (ims->ims_st[t].in > 0 && ims->ims_st[t].ex == 0) | |||
1019 | return (MCAST_INCLUDE1); | |||
1020 | return (MCAST_UNDEFINED0); | |||
1021 | } | |||
1022 | ||||
1023 | /* | |||
1024 | * Merge socket-layer source into IGMP-layer source. | |||
1025 | * If rollback is non-zero, perform the inverse of the merge. | |||
1026 | */ | |||
1027 | static void | |||
1028 | ims_merge(struct ip_msource *ims, const struct in_msource *lims, | |||
1029 | const int rollback) | |||
1030 | { | |||
1031 | int n = rollback ? -1 : 1; | |||
1032 | #ifdef IGMP_DEBUG1 | |||
1033 | struct in_addr ia; | |||
1034 | ||||
1035 | ia.s_addr = htonl(ims->ims_haddr)(__builtin_constant_p(ims->ims_haddr) ? ((__uint32_t)((((__uint32_t )(ims->ims_haddr) & 0xff000000) >> 24) | (((__uint32_t )(ims->ims_haddr) & 0x00ff0000) >> 8) | (((__uint32_t )(ims->ims_haddr) & 0x0000ff00) << 8) | (((__uint32_t )(ims->ims_haddr) & 0x000000ff) << 24))) : _OSSwapInt32 (ims->ims_haddr)); | |||
1036 | #endif | |||
1037 | ||||
1038 | if (lims->imsl_st[0] == MCAST_EXCLUDE2) { | |||
1039 | IGMP_INET_PRINTF(ia,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1040 | ("%s: t1 ex -= %d on %s\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1041 | __func__, n, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0); | |||
1042 | ims->ims_st[1].ex -= n; | |||
1043 | } else if (lims->imsl_st[0] == MCAST_INCLUDE1) { | |||
1044 | IGMP_INET_PRINTF(ia,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1045 | ("%s: t1 in -= %d on %s\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1046 | __func__, n, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in -= %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0); | |||
1047 | ims->ims_st[1].in -= n; | |||
1048 | } | |||
1049 | ||||
1050 | if (lims->imsl_st[1] == MCAST_EXCLUDE2) { | |||
1051 | IGMP_INET_PRINTF(ia,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1052 | ("%s: t1 ex += %d on %s\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1053 | __func__, n, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 ex += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0); | |||
1054 | ims->ims_st[1].ex += n; | |||
1055 | } else if (lims->imsl_st[1] == MCAST_INCLUDE1) { | |||
1056 | IGMP_INET_PRINTF(ia,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1057 | ("%s: t1 in += %d on %s\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0) | |||
1058 | __func__, n, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ia), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: t1 in += %d on %s\n" , __func__, n, _igmp_inet_buf); } } while (0); | |||
1059 | ims->ims_st[1].in += n; | |||
1060 | } | |||
1061 | } | |||
1062 | ||||
1063 | /* | |||
1064 | * Atomically update the global in_multi state, when a membership's | |||
1065 | * filter list is being updated in any way. | |||
1066 | * | |||
1067 | * imf is the per-inpcb-membership group filter pointer. | |||
1068 | * A fake imf may be passed for in-kernel consumers. | |||
1069 | * | |||
1070 | * XXX This is a candidate for a set-symmetric-difference style loop | |||
1071 | * which would eliminate the repeated lookup from root of ims nodes, | |||
1072 | * as they share the same key space. | |||
1073 | * | |||
1074 | * If any error occurred this function will back out of refcounts | |||
1075 | * and return a non-zero value. | |||
1076 | */ | |||
1077 | static int | |||
1078 | inm_merge(struct in_multi *inm, /*const*/ struct in_mfilter *imf) | |||
1079 | { | |||
1080 | struct ip_msource *ims, *nims; | |||
1081 | struct in_msource *lims; | |||
1082 | int schanged, error; | |||
1083 | int nsrc0, nsrc1; | |||
1084 | ||||
1085 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
1086 | ||||
1087 | schanged = 0; | |||
1088 | error = 0; | |||
1089 | nsrc1 = nsrc0 = 0; | |||
1090 | ||||
1091 | /* | |||
1092 | * Update the source filters first, as this may fail. | |||
1093 | * Maintain count of in-mode filters at t0, t1. These are | |||
1094 | * used to work out if we transition into ASM mode or not. | |||
1095 | * Maintain a count of source filters whose state was | |||
1096 | * actually modified by this operation. | |||
1097 | */ | |||
1098 | RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT( ims)) { | |||
1099 | lims = (struct in_msource *)ims; | |||
1100 | if (lims->imsl_st[0] == imf->imf_st[0]) nsrc0++; | |||
1101 | if (lims->imsl_st[1] == imf->imf_st[1]) nsrc1++; | |||
1102 | if (lims->imsl_st[0] == lims->imsl_st[1]) continue; | |||
1103 | error = inm_get_source(inm, lims->ims_haddr, 0, &nims); | |||
1104 | ++schanged; | |||
1105 | if (error) | |||
1106 | break; | |||
1107 | ims_merge(nims, lims, 0); | |||
1108 | } | |||
1109 | if (error) { | |||
1110 | struct ip_msource *bims; | |||
1111 | ||||
1112 | RB_FOREACH_REVERSE_FROM(ims, ip_msource_tree, nims)for ((ims) = (nims); ((ims) != ((void *)0)) && ((nims ) = ip_msource_tree_RB_PREV(ims), (ims) != ((void *)0)); (ims ) = (nims)) { | |||
1113 | lims = (struct in_msource *)ims; | |||
1114 | if (lims->imsl_st[0] == lims->imsl_st[1]) | |||
1115 | continue; | |||
1116 | (void) inm_get_source(inm, lims->ims_haddr, 1, &bims); | |||
1117 | if (bims == NULL((void *)0)) | |||
1118 | continue; | |||
1119 | ims_merge(bims, lims, 1); | |||
1120 | } | |||
1121 | goto out_reap; | |||
1122 | } | |||
1123 | ||||
1124 | IGMP_PRINTF(("%s: imf filters in-mode: %d at t0, %d at t1\n",do { if (igmp_debug) printf ("%s: imf filters in-mode: %d at t0, %d at t1\n" , __func__, nsrc0, nsrc1); } while (0) | |||
1125 | __func__, nsrc0, nsrc1))do { if (igmp_debug) printf ("%s: imf filters in-mode: %d at t0, %d at t1\n" , __func__, nsrc0, nsrc1); } while (0); | |||
1126 | ||||
1127 | /* Handle transition between INCLUDE {n} and INCLUDE {} on socket. */ | |||
1128 | if (imf->imf_st[0] == imf->imf_st[1] && | |||
1129 | imf->imf_st[1] == MCAST_INCLUDE1) { | |||
1130 | if (nsrc1 == 0) { | |||
1131 | IGMP_PRINTF(("%s: --in on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: --in on inm at t1\n", __func__ ); } while (0); | |||
1132 | --inm->inm_st[1].iss_in; | |||
1133 | } | |||
1134 | } | |||
1135 | ||||
1136 | /* Handle filter mode transition on socket. */ | |||
1137 | if (imf->imf_st[0] != imf->imf_st[1]) { | |||
1138 | IGMP_PRINTF(("%s: imf transition %d to %d\n",do { if (igmp_debug) printf ("%s: imf transition %d to %d\n", __func__, imf->imf_st[0], imf->imf_st[1]); } while (0) | |||
1139 | __func__, imf->imf_st[0], imf->imf_st[1]))do { if (igmp_debug) printf ("%s: imf transition %d to %d\n", __func__, imf->imf_st[0], imf->imf_st[1]); } while (0); | |||
1140 | ||||
1141 | if (imf->imf_st[0] == MCAST_EXCLUDE2) { | |||
1142 | IGMP_PRINTF(("%s: --ex on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: --ex on inm at t1\n", __func__ ); } while (0); | |||
1143 | --inm->inm_st[1].iss_ex; | |||
1144 | } else if (imf->imf_st[0] == MCAST_INCLUDE1) { | |||
1145 | IGMP_PRINTF(("%s: --in on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: --in on inm at t1\n", __func__ ); } while (0); | |||
1146 | --inm->inm_st[1].iss_in; | |||
1147 | } | |||
1148 | ||||
1149 | if (imf->imf_st[1] == MCAST_EXCLUDE2) { | |||
1150 | IGMP_PRINTF(("%s: ex++ on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: ex++ on inm at t1\n", __func__ ); } while (0); | |||
1151 | inm->inm_st[1].iss_ex++; | |||
1152 | } else if (imf->imf_st[1] == MCAST_INCLUDE1 && nsrc1 > 0) { | |||
1153 | IGMP_PRINTF(("%s: in++ on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: in++ on inm at t1\n", __func__ ); } while (0); | |||
1154 | inm->inm_st[1].iss_in++; | |||
1155 | } | |||
1156 | } | |||
1157 | ||||
1158 | /* | |||
1159 | * Track inm filter state in terms of listener counts. | |||
1160 | * If there are any exclusive listeners, stack-wide | |||
1161 | * membership is exclusive. | |||
1162 | * Otherwise, if only inclusive listeners, stack-wide is inclusive. | |||
1163 | * If no listeners remain, state is undefined at t1, | |||
1164 | * and the IGMP lifecycle for this group should finish. | |||
1165 | */ | |||
1166 | if (inm->inm_st[1].iss_ex > 0) { | |||
1167 | IGMP_PRINTF(("%s: transition to EX\n", __func__))do { if (igmp_debug) printf ("%s: transition to EX\n", __func__ ); } while (0); | |||
1168 | inm->inm_st[1].iss_fmode = MCAST_EXCLUDE2; | |||
1169 | } else if (inm->inm_st[1].iss_in > 0) { | |||
1170 | IGMP_PRINTF(("%s: transition to IN\n", __func__))do { if (igmp_debug) printf ("%s: transition to IN\n", __func__ ); } while (0); | |||
1171 | inm->inm_st[1].iss_fmode = MCAST_INCLUDE1; | |||
1172 | } else { | |||
1173 | IGMP_PRINTF(("%s: transition to UNDEF\n", __func__))do { if (igmp_debug) printf ("%s: transition to UNDEF\n", __func__ ); } while (0); | |||
1174 | inm->inm_st[1].iss_fmode = MCAST_UNDEFINED0; | |||
1175 | } | |||
1176 | ||||
1177 | /* Decrement ASM listener count on transition out of ASM mode. */ | |||
1178 | if (imf->imf_st[0] == MCAST_EXCLUDE2 && nsrc0 == 0) { | |||
1179 | if ((imf->imf_st[1] != MCAST_EXCLUDE2) || | |||
1180 | (imf->imf_st[1] == MCAST_EXCLUDE2 && nsrc1 > 0)) { | |||
1181 | IGMP_PRINTF(("%s: --asm on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: --asm on inm at t1\n", __func__ ); } while (0); | |||
1182 | --inm->inm_st[1].iss_asm; | |||
1183 | } | |||
1184 | } | |||
1185 | ||||
1186 | /* Increment ASM listener count on transition to ASM mode. */ | |||
1187 | if (imf->imf_st[1] == MCAST_EXCLUDE2 && nsrc1 == 0) { | |||
1188 | IGMP_PRINTF(("%s: asm++ on inm at t1\n", __func__))do { if (igmp_debug) printf ("%s: asm++ on inm at t1\n", __func__ ); } while (0); | |||
1189 | inm->inm_st[1].iss_asm++; | |||
1190 | } | |||
1191 | ||||
1192 | IGMP_PRINTF(("%s: merged imf 0x%llx to inm 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0) | |||
1193 | (uint64_t)VM_KERNEL_ADDRPERM(imf),do { if (igmp_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0) | |||
1194 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (igmp_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0); | |||
1195 | inm_print(inm); | |||
1196 | ||||
1197 | out_reap: | |||
1198 | if (schanged > 0) { | |||
1199 | IGMP_PRINTF(("%s: sources changed; reaping\n", __func__))do { if (igmp_debug) printf ("%s: sources changed; reaping\n" , __func__); } while (0); | |||
1200 | inm_reap(inm); | |||
1201 | } | |||
1202 | return (error); | |||
1203 | } | |||
1204 | ||||
1205 | /* | |||
1206 | * Mark an in_multi's filter set deltas as committed. | |||
1207 | * Called by IGMP after a state change has been enqueued. | |||
1208 | */ | |||
1209 | void | |||
1210 | inm_commit(struct in_multi *inm) | |||
1211 | { | |||
1212 | struct ip_msource *ims; | |||
1213 | ||||
1214 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
1215 | ||||
1216 | IGMP_PRINTF(("%s: commit inm 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: commit inm 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0) | |||
1217 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (igmp_debug) printf ("%s: commit inm 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0); | |||
1218 | IGMP_PRINTF(("%s: pre commit:\n", __func__))do { if (igmp_debug) printf ("%s: pre commit:\n", __func__); } while (0); | |||
1219 | inm_print(inm); | |||
1220 | ||||
1221 | RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs)for ((ims) = ip_msource_tree_RB_MINMAX(&inm->inm_srcs, -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT(ims )) { | |||
1222 | ims->ims_st[0] = ims->ims_st[1]; | |||
1223 | } | |||
1224 | inm->inm_st[0] = inm->inm_st[1]; | |||
1225 | } | |||
1226 | ||||
1227 | /* | |||
1228 | * Reap unreferenced nodes from an in_multi's filter set. | |||
1229 | */ | |||
1230 | static void | |||
1231 | inm_reap(struct in_multi *inm) | |||
1232 | { | |||
1233 | struct ip_msource *ims, *tims; | |||
1234 | ||||
1235 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
1236 | ||||
1237 | RB_FOREACH_SAFE(ims, ip_msource_tree, &inm->inm_srcs, tims)for ((ims) = ip_msource_tree_RB_MINMAX(&inm->inm_srcs, -1); ((ims) != ((void *)0)) && ((tims) = ip_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
1238 | if (ims->ims_st[0].ex > 0 || ims->ims_st[0].in > 0 || | |||
1239 | ims->ims_st[1].ex > 0 || ims->ims_st[1].in > 0 || | |||
1240 | ims->ims_stp != 0) | |||
1241 | continue; | |||
1242 | IGMP_PRINTF(("%s: free ims 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
1243 | (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (igmp_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
1244 | RB_REMOVE(ip_msource_tree, &inm->inm_srcs, ims)ip_msource_tree_RB_REMOVE(&inm->inm_srcs, ims); | |||
1245 | ipms_free(ims); | |||
1246 | inm->inm_nsrc--; | |||
1247 | } | |||
1248 | } | |||
1249 | ||||
1250 | /* | |||
1251 | * Purge all source nodes from an in_multi's filter set. | |||
1252 | */ | |||
1253 | void | |||
1254 | inm_purge(struct in_multi *inm) | |||
1255 | { | |||
1256 | struct ip_msource *ims, *tims; | |||
1257 | ||||
1258 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
1259 | ||||
1260 | RB_FOREACH_SAFE(ims, ip_msource_tree, &inm->inm_srcs, tims)for ((ims) = ip_msource_tree_RB_MINMAX(&inm->inm_srcs, -1); ((ims) != ((void *)0)) && ((tims) = ip_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
1261 | IGMP_PRINTF(("%s: free ims 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
1262 | (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (igmp_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
1263 | RB_REMOVE(ip_msource_tree, &inm->inm_srcs, ims)ip_msource_tree_RB_REMOVE(&inm->inm_srcs, ims); | |||
1264 | ipms_free(ims); | |||
1265 | inm->inm_nsrc--; | |||
1266 | } | |||
1267 | } | |||
1268 | ||||
1269 | /* | |||
1270 | * Join a multicast group; real entry point. | |||
1271 | * | |||
1272 | * Only preserves atomicity at inm level. | |||
1273 | * NOTE: imf argument cannot be const due to sys/tree.h limitations. | |||
1274 | * | |||
1275 | * If the IGMP downcall fails, the group is not joined, and an error | |||
1276 | * code is returned. | |||
1277 | */ | |||
1278 | static int | |||
1279 | in_joingroup(struct ifnet *ifp, const struct in_addr *gina, | |||
1280 | /*const*/ struct in_mfilter *imf, struct in_multi **pinm) | |||
1281 | { | |||
1282 | struct in_mfilter timf; | |||
1283 | struct in_multi *inm = NULL((void *)0); | |||
1284 | int error = 0; | |||
1285 | struct igmp_tparams itp; | |||
1286 | ||||
1287 | IGMP_INET_PRINTF(*gina, ("%s: join %s on 0x%llx(%s))\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (*gina), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: join %s on 0x%llx(%s))\n" , __func__, _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm ), ifp->if_xname); } } while (0) | |||
1288 | _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp), if_name(ifp)))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (*gina), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: join %s on 0x%llx(%s))\n" , __func__, _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm ), ifp->if_xname); } } while (0); | |||
1289 | ||||
1290 | bzero(&itp, sizeof (itp)); | |||
1291 | *pinm = NULL((void *)0); | |||
1292 | ||||
1293 | /* | |||
1294 | * If no imf was specified (i.e. kernel consumer), | |||
1295 | * fake one up and assume it is an ASM join. | |||
1296 | */ | |||
1297 | if (imf == NULL((void *)0)) { | |||
1298 | imf_init(&timf, MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
1299 | imf = &timf; | |||
1300 | } | |||
1301 | ||||
1302 | error = in_getmulti(ifp, gina, &inm); | |||
1303 | if (error) { | |||
1304 | IGMP_PRINTF(("%s: in_getmulti() failure\n", __func__))do { if (igmp_debug) printf ("%s: in_getmulti() failure\n", __func__ ); } while (0); | |||
1305 | return (error); | |||
1306 | } | |||
1307 | ||||
1308 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1309 | ||||
1310 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
1311 | error = inm_merge(inm, imf); | |||
1312 | if (error) { | |||
1313 | IGMP_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
1314 | goto out_inm_release; | |||
1315 | } | |||
1316 | ||||
1317 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
1318 | error = igmp_change_state(inm, &itp); | |||
1319 | if (error) { | |||
1320 | IGMP_PRINTF(("%s: failed to update source\n", __func__))do { if (igmp_debug) printf ("%s: failed to update source\n", __func__); } while (0); | |||
1321 | imf_rollback(imf); | |||
1322 | goto out_inm_release; | |||
1323 | } | |||
1324 | ||||
1325 | out_inm_release: | |||
1326 | if (error) { | |||
1327 | IGMP_PRINTF(("%s: dropping ref on 0x%llx\n", __func__,do { if (igmp_debug) printf ("%s: dropping ref on 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0) | |||
1328 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (igmp_debug) printf ("%s: dropping ref on 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0); | |||
1329 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
1330 | INM_REMREF(inm)inm_remref(inm, 0); | |||
1331 | } else { | |||
1332 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
1333 | *pinm = inm; /* keep refcount from in_getmulti() */ | |||
1334 | } | |||
1335 | ||||
1336 | /* schedule timer now that we've dropped the lock(s) */ | |||
1337 | igmp_set_timeout(&itp); | |||
1338 | ||||
1339 | return (error); | |||
1340 | } | |||
1341 | ||||
1342 | /* | |||
1343 | * Leave a multicast group; real entry point. | |||
1344 | * All source filters will be expunged. | |||
1345 | * | |||
1346 | * Only preserves atomicity at inm level. | |||
1347 | * | |||
1348 | * Note: This is not the same as inm_release(*) as this function also | |||
1349 | * makes a state change downcall into IGMP. | |||
1350 | */ | |||
1351 | int | |||
1352 | in_leavegroup(struct in_multi *inm, /*const*/ struct in_mfilter *imf) | |||
1353 | { | |||
1354 | struct in_mfilter timf; | |||
1355 | int error, lastref; | |||
1356 | struct igmp_tparams itp; | |||
1357 | ||||
1358 | bzero(&itp, sizeof (itp)); | |||
1359 | error = 0; | |||
1360 | ||||
1361 | INM_LOCK_ASSERT_NOTHELD(inm)lck_mtx_assert(&(inm)->inm_lock, 2); | |||
1362 | ||||
1363 | in_multihead_lock_exclusive(); | |||
1364 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
1365 | ||||
1366 | IGMP_INET_PRINTF(inm->inm_addr,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (inm->inm_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__, (uint64_t )(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(inm) + vm_kernel_addrperm), _igmp_inet_buf, (inm_is_ifp_detached (inm) ? "null" : inm->inm_ifp->if_name), inm->inm_ifp ->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm)); } } while ( 0) | |||
1367 | ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (inm->inm_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__, (uint64_t )(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(inm) + vm_kernel_addrperm), _igmp_inet_buf, (inm_is_ifp_detached (inm) ? "null" : inm->inm_ifp->if_name), inm->inm_ifp ->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm)); } } while ( 0) | |||
1368 | (uint64_t)VM_KERNEL_ADDRPERM(inm), _igmp_inet_buf,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (inm->inm_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__, (uint64_t )(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(inm) + vm_kernel_addrperm), _igmp_inet_buf, (inm_is_ifp_detached (inm) ? "null" : inm->inm_ifp->if_name), inm->inm_ifp ->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm)); } } while ( 0) | |||
1369 | (inm_is_ifp_detached(inm) ? "null" : inm->inm_ifp->if_name),do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (inm->inm_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__, (uint64_t )(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(inm) + vm_kernel_addrperm), _igmp_inet_buf, (inm_is_ifp_detached (inm) ? "null" : inm->inm_ifp->if_name), inm->inm_ifp ->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm)); } } while ( 0) | |||
1370 | inm->inm_ifp->if_unit, (uint64_t)VM_KERNEL_ADDRPERM(imf)))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (inm->inm_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__, (uint64_t )(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(inm) + vm_kernel_addrperm), _igmp_inet_buf, (inm_is_ifp_detached (inm) ? "null" : inm->inm_ifp->if_name), inm->inm_ifp ->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm)); } } while ( 0); | |||
1371 | ||||
1372 | /* | |||
1373 | * If no imf was specified (i.e. kernel consumer), | |||
1374 | * fake one up and assume it is an ASM join. | |||
1375 | */ | |||
1376 | if (imf == NULL((void *)0)) { | |||
1377 | imf_init(&timf, MCAST_EXCLUDE2, MCAST_UNDEFINED0); | |||
1378 | imf = &timf; | |||
1379 | } | |||
1380 | ||||
1381 | /* | |||
1382 | * Begin state merge transaction at IGMP layer. | |||
1383 | * | |||
1384 | * As this particular invocation should not cause any memory | |||
1385 | * to be allocated, and there is no opportunity to roll back | |||
1386 | * the transaction, it MUST NOT fail. | |||
1387 | */ | |||
1388 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1389 | ||||
1390 | error = inm_merge(inm, imf); | |||
1391 | KASSERT(error == 0, ("%s: failed to merge inm state\n", __func__)); | |||
1392 | ||||
1393 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
1394 | error = igmp_change_state(inm, &itp); | |||
1395 | #if IGMP_DEBUG1 | |||
1396 | if (error) | |||
1397 | IGMP_PRINTF(("%s: failed igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0); | |||
1398 | #endif | |||
1399 | lastref = in_multi_detach(inm); | |||
1400 | VERIFY(!lastref || (!(inm->inm_debug & IFD_ATTACHED) &&((void)(__builtin_expect(!!((long)((!lastref || (!(inm->inm_debug & 0x1) && inm->inm_reqcnt == 0)))), 1L) || assfail ("!lastref || (!(inm->inm_debug & IFD_ATTACHED) && inm->inm_reqcnt == 0)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 1401 ))) | |||
1401 | inm->inm_reqcnt == 0))((void)(__builtin_expect(!!((long)((!lastref || (!(inm->inm_debug & 0x1) && inm->inm_reqcnt == 0)))), 1L) || assfail ("!lastref || (!(inm->inm_debug & IFD_ATTACHED) && inm->inm_reqcnt == 0)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 1401 ))); | |||
1402 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
1403 | in_multihead_lock_done(); | |||
1404 | ||||
1405 | if (lastref) | |||
1406 | INM_REMREF(inm)inm_remref(inm, 0); /* for in_multihead list */ | |||
1407 | ||||
1408 | /* schedule timer now that we've dropped the lock(s) */ | |||
1409 | igmp_set_timeout(&itp); | |||
1410 | ||||
1411 | return (error); | |||
1412 | } | |||
1413 | ||||
1414 | /* | |||
1415 | * Join an IPv4 multicast group in (*,G) exclusive mode. | |||
1416 | * The group must be a 224.0.0.0/24 link-scope group. | |||
1417 | * This KPI is for legacy kernel consumers only. | |||
1418 | */ | |||
1419 | struct in_multi * | |||
1420 | in_addmulti(struct in_addr *ap, struct ifnet *ifp) | |||
1421 | { | |||
1422 | struct in_multi *pinm = NULL((void *)0); | |||
1423 | int error; | |||
1424 | ||||
1425 | KASSERT(IN_LOCAL_GROUP(ntohl(ap->s_addr)), | |||
1426 | ("%s: %s not in 224.0.0.0/24\n", __func__, inet_ntoa(*ap))); | |||
1427 | ||||
1428 | error = in_joingroup(ifp, ap, NULL((void *)0), &pinm); | |||
1429 | VERIFY(pinm != NULL || error != 0)((void)(__builtin_expect(!!((long)((pinm != ((void *)0) || error != 0))), 1L) || assfail("pinm != NULL || error != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 1429))); | |||
1430 | ||||
1431 | return (pinm); | |||
1432 | } | |||
1433 | ||||
1434 | /* | |||
1435 | * Leave an IPv4 multicast group, assumed to be in exclusive (*,G) mode. | |||
1436 | * This KPI is for legacy kernel consumers only. | |||
1437 | */ | |||
1438 | void | |||
1439 | in_delmulti(struct in_multi *inm) | |||
1440 | { | |||
1441 | ||||
1442 | (void) in_leavegroup(inm, NULL((void *)0)); | |||
1443 | } | |||
1444 | ||||
1445 | /* | |||
1446 | * Block or unblock an ASM multicast source on an inpcb. | |||
1447 | * This implements the delta-based API described in RFC 3678. | |||
1448 | * | |||
1449 | * The delta-based API applies only to exclusive-mode memberships. | |||
1450 | * An IGMP downcall will be performed. | |||
1451 | * | |||
1452 | * Return 0 if successful, otherwise return an appropriate error code. | |||
1453 | */ | |||
1454 | static int | |||
1455 | inp_block_unblock_source(struct inpcb *inp, struct sockopt *sopt) | |||
1456 | { | |||
1457 | struct group_source_req gsr; | |||
1458 | sockunion_t *gsa, *ssa; | |||
1459 | struct ifnet *ifp; | |||
1460 | struct in_mfilter *imf; | |||
1461 | struct ip_moptions *imo; | |||
1462 | struct in_msource *ims; | |||
1463 | struct in_multi *inm; | |||
1464 | size_t idx; | |||
1465 | uint16_t fmode; | |||
1466 | int error, doblock; | |||
1467 | unsigned int ifindex = 0; | |||
1468 | struct igmp_tparams itp; | |||
1469 | ||||
1470 | bzero(&itp, sizeof (itp)); | |||
1471 | ifp = NULL((void *)0); | |||
1472 | error = 0; | |||
1473 | doblock = 0; | |||
1474 | ||||
1475 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
1476 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
1477 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
1478 | ||||
1479 | switch (sopt->sopt_name) { | |||
1480 | case IP_BLOCK_SOURCE72: | |||
1481 | case IP_UNBLOCK_SOURCE73: { | |||
1482 | struct ip_mreq_source mreqs; | |||
1483 | ||||
1484 | error = sooptcopyin(sopt, &mreqs, | |||
1485 | sizeof(struct ip_mreq_source), | |||
1486 | sizeof(struct ip_mreq_source)); | |||
1487 | if (error) | |||
1488 | return (error); | |||
1489 | ||||
1490 | gsa->sin.sin_family = AF_INET2; | |||
1491 | gsa->sin.sin_len = sizeof(struct sockaddr_in); | |||
1492 | gsa->sin.sin_addr = mreqs.imr_multiaddr; | |||
1493 | ||||
1494 | ssa->sin.sin_family = AF_INET2; | |||
1495 | ssa->sin.sin_len = sizeof(struct sockaddr_in); | |||
1496 | ssa->sin.sin_addr = mreqs.imr_sourceaddr; | |||
1497 | ||||
1498 | if (!in_nullhost(mreqs.imr_interface)((mreqs.imr_interface).s_addr == (u_int32_t)0x00000000)) | |||
1499 | ifp = ip_multicast_if(&mreqs.imr_interface, &ifindex); | |||
1500 | ||||
1501 | if (sopt->sopt_name == IP_BLOCK_SOURCE72) | |||
1502 | doblock = 1; | |||
1503 | ||||
1504 | IGMP_INET_PRINTF(mreqs.imr_interface,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
1505 | ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
1506 | _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0); | |||
1507 | break; | |||
1508 | } | |||
1509 | ||||
1510 | case MCAST_BLOCK_SOURCE84: | |||
1511 | case MCAST_UNBLOCK_SOURCE85: | |||
1512 | error = sooptcopyin(sopt, &gsr, | |||
1513 | sizeof(struct group_source_req), | |||
1514 | sizeof(struct group_source_req)); | |||
1515 | if (error) | |||
1516 | return (error); | |||
1517 | ||||
1518 | if (gsa->sin.sin_family != AF_INET2 || | |||
1519 | gsa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
1520 | return (EINVAL22); | |||
1521 | ||||
1522 | if (ssa->sin.sin_family != AF_INET2 || | |||
1523 | ssa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
1524 | return (EINVAL22); | |||
1525 | ||||
1526 | ifnet_head_lock_shared(); | |||
1527 | if (gsr.gsr_interface == 0 || | |||
1528 | (u_int)if_index < gsr.gsr_interface) { | |||
1529 | ifnet_head_done(); | |||
1530 | return (EADDRNOTAVAIL49); | |||
1531 | } | |||
1532 | ||||
1533 | ifp = ifindex2ifnet[gsr.gsr_interface]; | |||
1534 | ifnet_head_done(); | |||
1535 | ||||
1536 | if (ifp == NULL((void *)0)) | |||
1537 | return (EADDRNOTAVAIL49); | |||
1538 | ||||
1539 | if (sopt->sopt_name == MCAST_BLOCK_SOURCE84) | |||
1540 | doblock = 1; | |||
1541 | break; | |||
1542 | ||||
1543 | default: | |||
1544 | IGMP_PRINTF(("%s: unknown sopt_name %d\n",do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
1545 | __func__, sopt->sopt_name))do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
1546 | return (EOPNOTSUPP102); | |||
1547 | } | |||
1548 | ||||
1549 | if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr))(((u_int32_t)((__builtin_constant_p(gsa->sin.sin_addr.s_addr ) ? ((__uint32_t)((((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(gsa->sin. sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(gsa->sin.sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsa->sin.sin_addr.s_addr)) ) & 0xf0000000) == 0xe0000000)) | |||
1550 | return (EINVAL22); | |||
1551 | ||||
1552 | /* | |||
1553 | * Check if we are actually a member of this group. | |||
1554 | */ | |||
1555 | imo = inp_findmoptions(inp); | |||
1556 | if (imo == NULL((void *)0)) | |||
1557 | return (ENOMEM12); | |||
1558 | ||||
1559 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1560 | idx = imo_match_group(imo, ifp, &gsa->sa); | |||
1561 | if (idx == (size_t)-1 || imo->imo_mfilters == NULL((void *)0)) { | |||
1562 | error = EADDRNOTAVAIL49; | |||
1563 | goto out_imo_locked; | |||
1564 | } | |||
1565 | ||||
1566 | VERIFY(imo->imo_mfilters != NULL)((void)(__builtin_expect(!!((long)((imo->imo_mfilters != ( (void *)0)))), 1L) || assfail("imo->imo_mfilters != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 1566 ))); | |||
1567 | imf = &imo->imo_mfilters[idx]; | |||
1568 | inm = imo->imo_membership[idx]; | |||
1569 | ||||
1570 | /* | |||
1571 | * Attempting to use the delta-based API on an | |||
1572 | * non exclusive-mode membership is an error. | |||
1573 | */ | |||
1574 | fmode = imf->imf_st[0]; | |||
1575 | if (fmode != MCAST_EXCLUDE2) { | |||
1576 | error = EINVAL22; | |||
1577 | goto out_imo_locked; | |||
1578 | } | |||
1579 | ||||
1580 | /* | |||
1581 | * Deal with error cases up-front: | |||
1582 | * Asked to block, but already blocked; or | |||
1583 | * Asked to unblock, but nothing to unblock. | |||
1584 | * If adding a new block entry, allocate it. | |||
1585 | */ | |||
1586 | ims = imo_match_source(imo, idx, &ssa->sa); | |||
1587 | if ((ims != NULL((void *)0) && doblock) || (ims == NULL((void *)0) && !doblock)) { | |||
1588 | IGMP_INET_PRINTF(ssa->sin.sin_addr,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , doblock ? "" : "not "); } } while (0) | |||
1589 | ("%s: source %s %spresent\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , doblock ? "" : "not "); } } while (0) | |||
1590 | _igmp_inet_buf, doblock ? "" : "not "))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , doblock ? "" : "not "); } } while (0); | |||
1591 | error = EADDRNOTAVAIL49; | |||
1592 | goto out_imo_locked; | |||
1593 | } | |||
1594 | ||||
1595 | /* | |||
1596 | * Begin state merge transaction at socket layer. | |||
1597 | */ | |||
1598 | if (doblock) { | |||
1599 | IGMP_PRINTF(("%s: %s source\n", __func__, "block"))do { if (igmp_debug) printf ("%s: %s source\n", __func__, "block" ); } while (0); | |||
1600 | ims = imf_graft(imf, fmode, &ssa->sin); | |||
1601 | if (ims == NULL((void *)0)) | |||
1602 | error = ENOMEM12; | |||
1603 | } else { | |||
1604 | IGMP_PRINTF(("%s: %s source\n", __func__, "allow"))do { if (igmp_debug) printf ("%s: %s source\n", __func__, "allow" ); } while (0); | |||
1605 | error = imf_prune(imf, &ssa->sin); | |||
1606 | } | |||
1607 | ||||
1608 | if (error) { | |||
1609 | IGMP_PRINTF(("%s: merge imf state failed\n", __func__))do { if (igmp_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
1610 | goto out_imf_rollback; | |||
1611 | } | |||
1612 | ||||
1613 | /* | |||
1614 | * Begin state merge transaction at IGMP layer. | |||
1615 | */ | |||
1616 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
1617 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1618 | error = inm_merge(inm, imf); | |||
1619 | if (error) { | |||
1620 | IGMP_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
1621 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
1622 | goto out_imf_rollback; | |||
1623 | } | |||
1624 | ||||
1625 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
1626 | error = igmp_change_state(inm, &itp); | |||
1627 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
1628 | #if IGMP_DEBUG1 | |||
1629 | if (error) | |||
1630 | IGMP_PRINTF(("%s: failed igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0); | |||
1631 | #endif | |||
1632 | ||||
1633 | out_imf_rollback: | |||
1634 | if (error) | |||
1635 | imf_rollback(imf); | |||
1636 | else | |||
1637 | imf_commit(imf); | |||
1638 | ||||
1639 | imf_reap(imf); | |||
1640 | ||||
1641 | out_imo_locked: | |||
1642 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1643 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
1644 | ||||
1645 | /* schedule timer now that we've dropped the lock(s) */ | |||
1646 | igmp_set_timeout(&itp); | |||
1647 | ||||
1648 | return (error); | |||
1649 | } | |||
1650 | ||||
1651 | /* | |||
1652 | * Given an inpcb, return its multicast options structure pointer. | |||
1653 | * | |||
1654 | * Caller is responsible for locking the inpcb, and releasing the | |||
1655 | * extra reference held on the imo, upon a successful return. | |||
1656 | */ | |||
1657 | static struct ip_moptions * | |||
1658 | inp_findmoptions(struct inpcb *inp) | |||
1659 | { | |||
1660 | struct ip_moptions *imo; | |||
1661 | struct in_multi **immp; | |||
1662 | struct in_mfilter *imfp; | |||
1663 | size_t idx; | |||
1664 | ||||
1665 | if ((imo = inp->inp_moptionsinp_depend4.inp4_moptions) != NULL((void *)0)) { | |||
1666 | IMO_ADDREF(imo)imo_addref(imo, 0); /* for caller */ | |||
1667 | return (imo); | |||
1668 | } | |||
1669 | ||||
1670 | imo = ip_allocmoptions(M_WAITOK0x0000); | |||
1671 | if (imo == NULL((void *)0)) | |||
1672 | return (NULL((void *)0)); | |||
1673 | ||||
1674 | immp = _MALLOC(sizeof (*immp) * IP_MIN_MEMBERSHIPS, M_IPMOPTS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (*immp) * 31, 53, 0x0000 | 0x0004, & site); }) | |||
1675 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (*immp) * 31, 53, 0x0000 | 0x0004, & site); }); | |||
1676 | if (immp == NULL((void *)0)) { | |||
1677 | IMO_REMREF(imo)imo_remref(imo); | |||
1678 | return (NULL((void *)0)); | |||
1679 | } | |||
1680 | ||||
1681 | imfp = _MALLOC(sizeof (struct in_mfilter) * IP_MIN_MEMBERSHIPS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (struct in_mfilter) * 31, 110, 0x0000 | 0x0004 , &site); }) | |||
1682 | M_INMFILTER, M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (struct in_mfilter) * 31, 110, 0x0000 | 0x0004 , &site); }); | |||
1683 | if (imfp == NULL((void *)0)) { | |||
1684 | _FREE(immp, M_IPMOPTS53); | |||
1685 | IMO_REMREF(imo)imo_remref(imo); | |||
1686 | return (NULL((void *)0)); | |||
1687 | } | |||
1688 | ||||
1689 | imo->imo_multicast_ifp = NULL((void *)0); | |||
1690 | imo->imo_multicast_addr.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
1691 | imo->imo_multicast_vif = -1; | |||
1692 | imo->imo_multicast_ttl = IP_DEFAULT_MULTICAST_TTL1; | |||
1693 | imo->imo_multicast_loop = in_mcast_loop; | |||
1694 | imo->imo_num_memberships = 0; | |||
1695 | imo->imo_max_memberships = IP_MIN_MEMBERSHIPS31; | |||
1696 | imo->imo_membership = immp; | |||
1697 | ||||
1698 | /* Initialize per-group source filters. */ | |||
1699 | for (idx = 0; idx < IP_MIN_MEMBERSHIPS31; idx++) | |||
1700 | imf_init(&imfp[idx], MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
1701 | ||||
1702 | imo->imo_mfilters = imfp; | |||
1703 | inp->inp_moptionsinp_depend4.inp4_moptions = imo; /* keep reference from ip_allocmoptions() */ | |||
1704 | IMO_ADDREF(imo)imo_addref(imo, 0); /* for caller */ | |||
1705 | ||||
1706 | return (imo); | |||
1707 | } | |||
1708 | /* | |||
1709 | * Atomically get source filters on a socket for an IPv4 multicast group. | |||
1710 | */ | |||
1711 | static int | |||
1712 | inp_get_source_filters(struct inpcb *inp, struct sockopt *sopt) | |||
1713 | { | |||
1714 | struct __msfilterreq64 msfr, msfr64; | |||
1715 | struct __msfilterreq32 msfr32; | |||
1716 | sockunion_t *gsa; | |||
1717 | struct ifnet *ifp; | |||
1718 | struct ip_moptions *imo; | |||
1719 | struct in_mfilter *imf; | |||
1720 | struct ip_msource *ims; | |||
1721 | struct in_msource *lims; | |||
1722 | struct sockaddr_in *psin; | |||
1723 | struct sockaddr_storage *ptss; | |||
1724 | struct sockaddr_storage *tss; | |||
1725 | int error; | |||
1726 | size_t idx, nsrcs, ncsrcs; | |||
1727 | user_addr_t tmp_ptr; | |||
1728 | ||||
1729 | imo = inp->inp_moptionsinp_depend4.inp4_moptions; | |||
1730 | VERIFY(imo != NULL)((void)(__builtin_expect(!!((long)((imo != ((void *)0)))), 1L ) || assfail("imo != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 1730))); | |||
1731 | ||||
1732 | if (IS_64BIT_PROCESS(current_proc())) { | |||
| ||||
1733 | error = sooptcopyin(sopt, &msfr64, | |||
1734 | sizeof(struct __msfilterreq64), | |||
1735 | sizeof(struct __msfilterreq64)); | |||
1736 | if (error) | |||
1737 | return (error); | |||
1738 | /* we never use msfr.msfr_srcs; */ | |||
1739 | memcpy(&msfr, &msfr64, sizeof(msfr64)); | |||
1740 | } else { | |||
1741 | error = sooptcopyin(sopt, &msfr32, | |||
1742 | sizeof(struct __msfilterreq32), | |||
1743 | sizeof(struct __msfilterreq32)); | |||
1744 | if (error) | |||
1745 | return (error); | |||
1746 | /* we never use msfr.msfr_srcs; */ | |||
1747 | memcpy(&msfr, &msfr32, sizeof(msfr32)); | |||
1748 | } | |||
1749 | ||||
1750 | ifnet_head_lock_shared(); | |||
1751 | if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) { | |||
1752 | ifnet_head_done(); | |||
1753 | return (EADDRNOTAVAIL49); | |||
1754 | } | |||
1755 | ||||
1756 | ifp = ifindex2ifnet[msfr.msfr_ifindex]; | |||
1757 | ifnet_head_done(); | |||
1758 | ||||
1759 | if (ifp == NULL((void *)0)) | |||
1760 | return (EADDRNOTAVAIL49); | |||
1761 | ||||
1762 | if ((size_t) msfr.msfr_nsrcs > | |||
1763 | UINT32_MAX4294967295U / sizeof(struct sockaddr_storage)) | |||
1764 | msfr.msfr_nsrcs = UINT32_MAX4294967295U / sizeof(struct sockaddr_storage); | |||
1765 | ||||
1766 | if (msfr.msfr_nsrcs > in_mcast_maxsocksrc) | |||
1767 | msfr.msfr_nsrcs = in_mcast_maxsocksrc; | |||
1768 | ||||
1769 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1770 | /* | |||
1771 | * Lookup group on the socket. | |||
1772 | */ | |||
1773 | gsa = (sockunion_t *)&msfr.msfr_group; | |||
1774 | idx = imo_match_group(imo, ifp, &gsa->sa); | |||
1775 | if (idx == (size_t)-1 || imo->imo_mfilters == NULL((void *)0)) { | |||
1776 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1777 | return (EADDRNOTAVAIL49); | |||
1778 | } | |||
1779 | imf = &imo->imo_mfilters[idx]; | |||
1780 | ||||
1781 | /* | |||
1782 | * Ignore memberships which are in limbo. | |||
1783 | */ | |||
1784 | if (imf->imf_st[1] == MCAST_UNDEFINED0) { | |||
1785 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1786 | return (EAGAIN35); | |||
1787 | } | |||
1788 | msfr.msfr_fmode = imf->imf_st[1]; | |||
1789 | ||||
1790 | /* | |||
1791 | * If the user specified a buffer, copy out the source filter | |||
1792 | * entries to userland gracefully. | |||
1793 | * We only copy out the number of entries which userland | |||
1794 | * has asked for, but we always tell userland how big the | |||
1795 | * buffer really needs to be. | |||
1796 | */ | |||
1797 | ||||
1798 | if (IS_64BIT_PROCESS(current_proc())) | |||
1799 | tmp_ptr = msfr64.msfr_srcs; | |||
1800 | else | |||
1801 | tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs)((user_addr_t)((uintptr_t)(msfr32.msfr_srcs))); | |||
1802 | ||||
1803 | tss = NULL((void *)0); | |||
1804 | if (tmp_ptr != USER_ADDR_NULL((user_addr_t) 0) && msfr.msfr_nsrcs > 0) { | |||
1805 | tss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss),({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss), 80, 0x0000 | 0x0004, &site); }) | |||
1806 | M_TEMP, M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss), 80, 0x0000 | 0x0004, &site); }); | |||
1807 | if (tss == NULL((void *)0)) { | |||
1808 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1809 | return (ENOBUFS55); | |||
1810 | } | |||
1811 | } | |||
1812 | ||||
1813 | /* | |||
1814 | * Count number of sources in-mode at t0. | |||
1815 | * If buffer space exists and remains, copy out source entries. | |||
1816 | */ | |||
1817 | nsrcs = msfr.msfr_nsrcs; | |||
1818 | ncsrcs = 0; | |||
1819 | ptss = tss; | |||
1820 | RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources)for ((ims) = ip_msource_tree_RB_MINMAX(&imf->imf_sources , -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT( ims)) { | |||
1821 | lims = (struct in_msource *)ims; | |||
1822 | if (lims->imsl_st[0] == MCAST_UNDEFINED0 || | |||
1823 | lims->imsl_st[0] != imf->imf_st[0]) | |||
1824 | continue; | |||
1825 | if (tss != NULL((void *)0) && nsrcs > 0) { | |||
1826 | psin = (struct sockaddr_in *)ptss; | |||
1827 | psin->sin_family = AF_INET2; | |||
1828 | psin->sin_len = sizeof(struct sockaddr_in); | |||
1829 | psin->sin_addr.s_addr = htonl(lims->ims_haddr)(__builtin_constant_p(lims->ims_haddr) ? ((__uint32_t)(((( __uint32_t)(lims->ims_haddr) & 0xff000000) >> 24 ) | (((__uint32_t)(lims->ims_haddr) & 0x00ff0000) >> 8) | (((__uint32_t)(lims->ims_haddr) & 0x0000ff00) << 8) | (((__uint32_t)(lims->ims_haddr) & 0x000000ff) << 24))) : _OSSwapInt32(lims->ims_haddr)); | |||
1830 | psin->sin_port = 0; | |||
1831 | ++ptss; | |||
1832 | --nsrcs; | |||
1833 | ++ncsrcs; | |||
1834 | } | |||
1835 | } | |||
1836 | ||||
1837 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1838 | ||||
1839 | if (tss != NULL((void *)0)) { | |||
1840 | error = copyout(tss, tmp_ptr, ncsrcs * sizeof(*tss)); | |||
1841 | FREE(tss, M_TEMP)_FREE((void *)tss, 80); | |||
1842 | if (error) | |||
1843 | return (error); | |||
1844 | } | |||
1845 | ||||
1846 | msfr.msfr_nsrcs = ncsrcs; | |||
1847 | if (IS_64BIT_PROCESS(current_proc())) { | |||
1848 | msfr64.msfr_ifindex = msfr.msfr_ifindex; | |||
1849 | msfr64.msfr_fmode = msfr.msfr_fmode; | |||
1850 | msfr64.msfr_nsrcs = msfr.msfr_nsrcs; | |||
1851 | memcpy(&msfr64.msfr_group, &msfr.msfr_group, | |||
1852 | sizeof(struct sockaddr_storage)); | |||
1853 | error = sooptcopyout(sopt, &msfr64, | |||
| ||||
1854 | sizeof(struct __msfilterreq64)); | |||
1855 | } else { | |||
1856 | msfr32.msfr_ifindex = msfr.msfr_ifindex; | |||
1857 | msfr32.msfr_fmode = msfr.msfr_fmode; | |||
1858 | msfr32.msfr_nsrcs = msfr.msfr_nsrcs; | |||
1859 | memcpy(&msfr32.msfr_group, &msfr.msfr_group, | |||
1860 | sizeof(struct sockaddr_storage)); | |||
1861 | error = sooptcopyout(sopt, &msfr32, | |||
1862 | sizeof(struct __msfilterreq32)); | |||
1863 | } | |||
1864 | ||||
1865 | return (error); | |||
1866 | } | |||
1867 | ||||
1868 | /* | |||
1869 | * Return the IP multicast options in response to user getsockopt(). | |||
1870 | */ | |||
1871 | int | |||
1872 | inp_getmoptions(struct inpcb *inp, struct sockopt *sopt) | |||
1873 | { | |||
1874 | struct ip_mreqn mreqn; | |||
1875 | struct ip_moptions *imo; | |||
1876 | struct ifnet *ifp; | |||
1877 | struct in_ifaddr *ia; | |||
1878 | int error, optval; | |||
1879 | unsigned int ifindex; | |||
1880 | u_char coptval; | |||
1881 | ||||
1882 | imo = inp->inp_moptionsinp_depend4.inp4_moptions; | |||
1883 | /* | |||
1884 | * If socket is neither of type SOCK_RAW or SOCK_DGRAM, | |||
1885 | * or is a divert socket, reject it. | |||
1886 | */ | |||
1887 | if (SOCK_PROTO(inp->inp_socket)((inp->inp_socket)->so_proto->pr_protocol) == IPPROTO_DIVERT254 || | |||
1888 | (SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_RAW3 && | |||
1889 | SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_DGRAM2)) { | |||
1890 | return (EOPNOTSUPP102); | |||
1891 | } | |||
1892 | ||||
1893 | error = 0; | |||
1894 | switch (sopt->sopt_name) { | |||
1895 | case IP_MULTICAST_IF9: | |||
1896 | memset(&mreqn, 0, sizeof(struct ip_mreqn)); | |||
1897 | if (imo != NULL((void *)0)) { | |||
1898 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1899 | ifp = imo->imo_multicast_ifp; | |||
1900 | if (!in_nullhost(imo->imo_multicast_addr)((imo->imo_multicast_addr).s_addr == (u_int32_t)0x00000000 )) { | |||
1901 | mreqn.imr_address = imo->imo_multicast_addr; | |||
1902 | } else if (ifp != NULL((void *)0)) { | |||
1903 | mreqn.imr_ifindex = ifp->if_index; | |||
1904 | IFP_TO_IA(ifp, ia){ lck_rw_lock_shared(in_ifaddr_rwlock); for ((ia) = ((&in_ifaddrhead )->tqh_first); (ia) != ((void *)0) && (ia)->ia_ifa .ifa_ifp != (ifp); (ia) = (((ia))->ia_link.tqe_next)) continue ; if ((ia) != ((void *)0)) ifa_addref(&(ia)->ia_ifa, 0 ); lck_rw_done(in_ifaddr_rwlock); }; | |||
1905 | if (ia != NULL((void *)0)) { | |||
1906 | IFA_LOCK_SPIN(&ia->ia_ifa)lck_mtx_lock_spin(&(&ia->ia_ifa)->ifa_lock); | |||
1907 | mreqn.imr_address = | |||
1908 | IA_SIN(ia)(&(((struct in_ifaddr *)(ia))->ia_addr))->sin_addr; | |||
1909 | IFA_UNLOCK(&ia->ia_ifa)lck_mtx_unlock(&(&ia->ia_ifa)->ifa_lock); | |||
1910 | IFA_REMREF(&ia->ia_ifa)do { (void) ifa_remref(&ia->ia_ifa, 0); } while (0); | |||
1911 | } | |||
1912 | } | |||
1913 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1914 | } | |||
1915 | if (sopt->sopt_valsize == sizeof(struct ip_mreqn)) { | |||
1916 | error = sooptcopyout(sopt, &mreqn, | |||
1917 | sizeof(struct ip_mreqn)); | |||
1918 | } else { | |||
1919 | error = sooptcopyout(sopt, &mreqn.imr_address, | |||
1920 | sizeof(struct in_addr)); | |||
1921 | } | |||
1922 | break; | |||
1923 | ||||
1924 | case IP_MULTICAST_IFINDEX66: | |||
1925 | if (imo != NULL((void *)0)) | |||
1926 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1927 | if (imo == NULL((void *)0) || imo->imo_multicast_ifp == NULL((void *)0)) { | |||
1928 | ifindex = 0; | |||
1929 | } else { | |||
1930 | ifindex = imo->imo_multicast_ifp->if_index; | |||
1931 | } | |||
1932 | if (imo != NULL((void *)0)) | |||
1933 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1934 | error = sooptcopyout(sopt, &ifindex, sizeof (ifindex)); | |||
1935 | break; | |||
1936 | ||||
1937 | case IP_MULTICAST_TTL10: | |||
1938 | if (imo == NULL((void *)0)) | |||
1939 | optval = coptval = IP_DEFAULT_MULTICAST_TTL1; | |||
1940 | else { | |||
1941 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1942 | optval = coptval = imo->imo_multicast_ttl; | |||
1943 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1944 | } | |||
1945 | if (sopt->sopt_valsize == sizeof(u_char)) | |||
1946 | error = sooptcopyout(sopt, &coptval, sizeof(u_char)); | |||
1947 | else | |||
1948 | error = sooptcopyout(sopt, &optval, sizeof(int)); | |||
1949 | break; | |||
1950 | ||||
1951 | case IP_MULTICAST_LOOP11: | |||
1952 | if (imo == 0) | |||
1953 | optval = coptval = IP_DEFAULT_MULTICAST_LOOP1; | |||
1954 | else { | |||
1955 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
1956 | optval = coptval = imo->imo_multicast_loop; | |||
1957 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
1958 | } | |||
1959 | if (sopt->sopt_valsize == sizeof(u_char)) | |||
1960 | error = sooptcopyout(sopt, &coptval, sizeof(u_char)); | |||
1961 | else | |||
1962 | error = sooptcopyout(sopt, &optval, sizeof(int)); | |||
1963 | break; | |||
1964 | ||||
1965 | case IP_MSFILTER74: | |||
1966 | if (imo == NULL((void *)0)) { | |||
1967 | error = EADDRNOTAVAIL49; | |||
1968 | } else { | |||
1969 | error = inp_get_source_filters(inp, sopt); | |||
1970 | } | |||
1971 | break; | |||
1972 | ||||
1973 | default: | |||
1974 | error = ENOPROTOOPT42; | |||
1975 | break; | |||
1976 | } | |||
1977 | ||||
1978 | return (error); | |||
1979 | } | |||
1980 | ||||
1981 | /* | |||
1982 | * Look up the ifnet to use for a multicast group membership, | |||
1983 | * given the IPv4 address of an interface, and the IPv4 group address. | |||
1984 | * | |||
1985 | * This routine exists to support legacy multicast applications | |||
1986 | * which do not understand that multicast memberships are scoped to | |||
1987 | * specific physical links in the networking stack, or which need | |||
1988 | * to join link-scope groups before IPv4 addresses are configured. | |||
1989 | * | |||
1990 | * If inp is non-NULL and is bound to an interface, use this socket's | |||
1991 | * inp_boundif for any required routing table lookup. | |||
1992 | * | |||
1993 | * If the route lookup fails, attempt to use the first non-loopback | |||
1994 | * interface with multicast capability in the system as a | |||
1995 | * last resort. The legacy IPv4 ASM API requires that we do | |||
1996 | * this in order to allow groups to be joined when the routing | |||
1997 | * table has not yet been populated during boot. | |||
1998 | * | |||
1999 | * Returns NULL if no ifp could be found. | |||
2000 | * | |||
2001 | */ | |||
2002 | static struct ifnet * | |||
2003 | inp_lookup_mcast_ifp(const struct inpcb *inp, | |||
2004 | const struct sockaddr_in *gsin, const struct in_addr ina) | |||
2005 | { | |||
2006 | struct ifnet *ifp; | |||
2007 | unsigned int ifindex = 0; | |||
2008 | ||||
2009 | VERIFY(gsin->sin_family == AF_INET)((void)(__builtin_expect(!!((long)((gsin->sin_family == 2) )), 1L) || assfail("gsin->sin_family == AF_INET", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 2009))); | |||
2010 | VERIFY(IN_MULTICAST(ntohl(gsin->sin_addr.s_addr)))((void)(__builtin_expect(!!((long)(((((u_int32_t)((__builtin_constant_p (gsin->sin_addr.s_addr) ? ((__uint32_t)((((__uint32_t)(gsin ->sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t )(gsin->sin_addr.s_addr) & 0x00ff0000) >> 8) | ( ((__uint32_t)(gsin->sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsin->sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsin->sin_addr.s_addr))) & 0xf0000000) == 0xe0000000)))), 1L) || assfail("IN_MULTICAST(ntohl(gsin->sin_addr.s_addr))" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 2010 ))); | |||
2011 | ||||
2012 | ifp = NULL((void *)0); | |||
2013 | if (!in_nullhost(ina)((ina).s_addr == (u_int32_t)0x00000000)) { | |||
2014 | struct in_addr new_ina; | |||
2015 | memcpy(&new_ina, &ina, sizeof(struct in_addr)); | |||
2016 | ifp = ip_multicast_if(&new_ina, &ifindex); | |||
2017 | } else { | |||
2018 | struct route ro; | |||
2019 | unsigned int ifscope = IFSCOPE_NONE0; | |||
2020 | ||||
2021 | if (inp != NULL((void *)0) && (inp->inp_flags & INP_BOUND_IF0x00004000)) | |||
2022 | ifscope = inp->inp_boundifp->if_index; | |||
2023 | ||||
2024 | bzero(&ro, sizeof (ro)); | |||
2025 | memcpy(&ro.ro_dst, gsin, sizeof(struct sockaddr_in)); | |||
2026 | rtalloc_scoped_ign(&ro, 0, ifscope); | |||
2027 | if (ro.ro_rt != NULL((void *)0)) { | |||
2028 | ifp = ro.ro_rt->rt_ifp; | |||
2029 | VERIFY(ifp != NULL)((void)(__builtin_expect(!!((long)((ifp != ((void *)0)))), 1L ) || assfail("ifp != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 2029))); | |||
2030 | } else { | |||
2031 | struct in_ifaddr *ia; | |||
2032 | struct ifnet *mifp; | |||
2033 | ||||
2034 | mifp = NULL((void *)0); | |||
2035 | lck_rw_lock_shared(in_ifaddr_rwlock); | |||
2036 | TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link)for ((ia) = (((&in_ifaddrhead))->tqh_first); (ia); (ia ) = (((ia))->ia_link.tqe_next)) { | |||
2037 | IFA_LOCK_SPIN(&ia->ia_ifa)lck_mtx_lock_spin(&(&ia->ia_ifa)->ifa_lock); | |||
2038 | mifp = ia->ia_ifpia_ifa.ifa_ifp; | |||
2039 | IFA_UNLOCK(&ia->ia_ifa)lck_mtx_unlock(&(&ia->ia_ifa)->ifa_lock); | |||
2040 | if (!(mifp->if_flags & IFF_LOOPBACK0x8) && | |||
2041 | (mifp->if_flags & IFF_MULTICAST0x8000)) { | |||
2042 | ifp = mifp; | |||
2043 | break; | |||
2044 | } | |||
2045 | } | |||
2046 | lck_rw_done(in_ifaddr_rwlock); | |||
2047 | } | |||
2048 | ROUTE_RELEASE(&ro)do { if ((&ro)->ro_rt != ((void *)0)) { lck_mtx_assert (&((&ro)->ro_rt)->rt_lock, 2); if (0) rtfree_locked ((&ro)->ro_rt); else rtfree((&ro)->ro_rt); (& ro)->ro_rt = ((void *)0); } if ((&ro)->ro_srcia != ( (void *)0)) { do { (void) ifa_remref((&ro)->ro_srcia, 0 ); } while (0); (&ro)->ro_srcia = ((void *)0); (&ro )->ro_flags &= ~0x1; } } while (0); | |||
2049 | } | |||
2050 | ||||
2051 | return (ifp); | |||
2052 | } | |||
2053 | ||||
2054 | /* | |||
2055 | * Join an IPv4 multicast group, possibly with a source. | |||
2056 | * | |||
2057 | * NB: sopt->sopt_val might point to the kernel address space. This means that | |||
2058 | * we were called by the IPv6 stack due to the presence of an IPv6 v4 mapped | |||
2059 | * address. In this scenario, sopt_p points to kernproc and sooptcopyin() will | |||
2060 | * just issue an in-kernel memcpy. | |||
2061 | */ | |||
2062 | int | |||
2063 | inp_join_group(struct inpcb *inp, struct sockopt *sopt) | |||
2064 | { | |||
2065 | struct group_source_req gsr; | |||
2066 | sockunion_t *gsa, *ssa; | |||
2067 | struct ifnet *ifp; | |||
2068 | struct in_mfilter *imf; | |||
2069 | struct ip_moptions *imo; | |||
2070 | struct in_multi *inm = NULL((void *)0); | |||
2071 | struct in_msource *lims; | |||
2072 | size_t idx; | |||
2073 | int error, is_new; | |||
2074 | struct igmp_tparams itp; | |||
2075 | ||||
2076 | bzero(&itp, sizeof (itp)); | |||
2077 | ifp = NULL((void *)0); | |||
2078 | imf = NULL((void *)0); | |||
2079 | error = 0; | |||
2080 | is_new = 0; | |||
2081 | ||||
2082 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
2083 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
2084 | gsa->ss.ss_family = AF_UNSPEC0; | |||
2085 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
2086 | ssa->ss.ss_family = AF_UNSPEC0; | |||
2087 | ||||
2088 | switch (sopt->sopt_name) { | |||
2089 | case IP_ADD_MEMBERSHIP12: | |||
2090 | case IP_ADD_SOURCE_MEMBERSHIP70: { | |||
2091 | struct ip_mreq_source mreqs; | |||
2092 | ||||
2093 | if (sopt->sopt_name == IP_ADD_MEMBERSHIP12) { | |||
2094 | error = sooptcopyin(sopt, &mreqs, | |||
2095 | sizeof(struct ip_mreq), | |||
2096 | sizeof(struct ip_mreq)); | |||
2097 | /* | |||
2098 | * Do argument switcharoo from ip_mreq into | |||
2099 | * ip_mreq_source to avoid using two instances. | |||
2100 | */ | |||
2101 | mreqs.imr_interface = mreqs.imr_sourceaddr; | |||
2102 | mreqs.imr_sourceaddr.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
2103 | } else if (sopt->sopt_name == IP_ADD_SOURCE_MEMBERSHIP70) { | |||
2104 | error = sooptcopyin(sopt, &mreqs, | |||
2105 | sizeof(struct ip_mreq_source), | |||
2106 | sizeof(struct ip_mreq_source)); | |||
2107 | } | |||
2108 | if (error) { | |||
2109 | IGMP_PRINTF(("%s: error copyin IP_ADD_MEMBERSHIP/"do { if (igmp_debug) printf ("%s: error copyin IP_ADD_MEMBERSHIP/" "IP_ADD_SOURCE_MEMBERSHIP %d err=%d\n", __func__, sopt->sopt_name , error); } while (0) | |||
2110 | "IP_ADD_SOURCE_MEMBERSHIP %d err=%d\n",do { if (igmp_debug) printf ("%s: error copyin IP_ADD_MEMBERSHIP/" "IP_ADD_SOURCE_MEMBERSHIP %d err=%d\n", __func__, sopt->sopt_name , error); } while (0) | |||
2111 | __func__, sopt->sopt_name, error))do { if (igmp_debug) printf ("%s: error copyin IP_ADD_MEMBERSHIP/" "IP_ADD_SOURCE_MEMBERSHIP %d err=%d\n", __func__, sopt->sopt_name , error); } while (0); | |||
2112 | return (error); | |||
2113 | } | |||
2114 | ||||
2115 | gsa->sin.sin_family = AF_INET2; | |||
2116 | gsa->sin.sin_len = sizeof(struct sockaddr_in); | |||
2117 | gsa->sin.sin_addr = mreqs.imr_multiaddr; | |||
2118 | ||||
2119 | if (sopt->sopt_name == IP_ADD_SOURCE_MEMBERSHIP70) { | |||
2120 | ssa->sin.sin_family = AF_INET2; | |||
2121 | ssa->sin.sin_len = sizeof(struct sockaddr_in); | |||
2122 | ssa->sin.sin_addr = mreqs.imr_sourceaddr; | |||
2123 | } | |||
2124 | ||||
2125 | if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr))(((u_int32_t)((__builtin_constant_p(gsa->sin.sin_addr.s_addr ) ? ((__uint32_t)((((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(gsa->sin. sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(gsa->sin.sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsa->sin.sin_addr.s_addr)) ) & 0xf0000000) == 0xe0000000)) | |||
2126 | return (EINVAL22); | |||
2127 | ||||
2128 | ifp = inp_lookup_mcast_ifp(inp, &gsa->sin, | |||
2129 | mreqs.imr_interface); | |||
2130 | IGMP_INET_PRINTF(mreqs.imr_interface,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
2131 | ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
2132 | _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0); | |||
2133 | break; | |||
2134 | } | |||
2135 | ||||
2136 | case MCAST_JOIN_GROUP80: | |||
2137 | case MCAST_JOIN_SOURCE_GROUP82: | |||
2138 | if (sopt->sopt_name == MCAST_JOIN_GROUP80) { | |||
2139 | error = sooptcopyin(sopt, &gsr, | |||
2140 | sizeof(struct group_req), | |||
2141 | sizeof(struct group_req)); | |||
2142 | } else if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP82) { | |||
2143 | error = sooptcopyin(sopt, &gsr, | |||
2144 | sizeof(struct group_source_req), | |||
2145 | sizeof(struct group_source_req)); | |||
2146 | } | |||
2147 | if (error) | |||
2148 | return (error); | |||
2149 | ||||
2150 | if (gsa->sin.sin_family != AF_INET2 || | |||
2151 | gsa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
2152 | return (EINVAL22); | |||
2153 | ||||
2154 | /* | |||
2155 | * Overwrite the port field if present, as the sockaddr | |||
2156 | * being copied in may be matched with a binary comparison. | |||
2157 | */ | |||
2158 | gsa->sin.sin_port = 0; | |||
2159 | if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP82) { | |||
2160 | if (ssa->sin.sin_family != AF_INET2 || | |||
2161 | ssa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
2162 | return (EINVAL22); | |||
2163 | ssa->sin.sin_port = 0; | |||
2164 | } | |||
2165 | ||||
2166 | if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr))(((u_int32_t)((__builtin_constant_p(gsa->sin.sin_addr.s_addr ) ? ((__uint32_t)((((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(gsa->sin. sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(gsa->sin.sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsa->sin.sin_addr.s_addr)) ) & 0xf0000000) == 0xe0000000)) | |||
2167 | return (EINVAL22); | |||
2168 | ||||
2169 | ifnet_head_lock_shared(); | |||
2170 | if (gsr.gsr_interface == 0 || | |||
2171 | (u_int)if_index < gsr.gsr_interface) { | |||
2172 | ifnet_head_done(); | |||
2173 | return (EADDRNOTAVAIL49); | |||
2174 | } | |||
2175 | ifp = ifindex2ifnet[gsr.gsr_interface]; | |||
2176 | ifnet_head_done(); | |||
2177 | ||||
2178 | break; | |||
2179 | ||||
2180 | default: | |||
2181 | IGMP_PRINTF(("%s: unknown sopt_name %d\n",do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
2182 | __func__, sopt->sopt_name))do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
2183 | return (EOPNOTSUPP102); | |||
2184 | } | |||
2185 | ||||
2186 | if (ifp == NULL((void *)0) || (ifp->if_flags & IFF_MULTICAST0x8000) == 0) | |||
2187 | return (EADDRNOTAVAIL49); | |||
2188 | ||||
2189 | imo = inp_findmoptions(inp); | |||
2190 | if (imo == NULL((void *)0)) | |||
2191 | return (ENOMEM12); | |||
2192 | ||||
2193 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2194 | idx = imo_match_group(imo, ifp, &gsa->sa); | |||
2195 | if (idx == (size_t)-1) { | |||
2196 | is_new = 1; | |||
2197 | } else { | |||
2198 | inm = imo->imo_membership[idx]; | |||
2199 | imf = &imo->imo_mfilters[idx]; | |||
2200 | if (ssa->ss.ss_family != AF_UNSPEC0) { | |||
2201 | /* | |||
2202 | * MCAST_JOIN_SOURCE_GROUP on an exclusive membership | |||
2203 | * is an error. On an existing inclusive membership, | |||
2204 | * it just adds the source to the filter list. | |||
2205 | */ | |||
2206 | if (imf->imf_st[1] != MCAST_INCLUDE1) { | |||
2207 | error = EINVAL22; | |||
2208 | goto out_imo_locked; | |||
2209 | } | |||
2210 | /* | |||
2211 | * Throw out duplicates. | |||
2212 | * | |||
2213 | * XXX FIXME: This makes a naive assumption that | |||
2214 | * even if entries exist for *ssa in this imf, | |||
2215 | * they will be rejected as dupes, even if they | |||
2216 | * are not valid in the current mode (in-mode). | |||
2217 | * | |||
2218 | * in_msource is transactioned just as for anything | |||
2219 | * else in SSM -- but note naive use of inm_graft() | |||
2220 | * below for allocating new filter entries. | |||
2221 | * | |||
2222 | * This is only an issue if someone mixes the | |||
2223 | * full-state SSM API with the delta-based API, | |||
2224 | * which is discouraged in the relevant RFCs. | |||
2225 | */ | |||
2226 | lims = imo_match_source(imo, idx, &ssa->sa); | |||
2227 | if (lims != NULL((void *)0) /*&& | |||
2228 | lims->imsl_st[1] == MCAST_INCLUDE*/) { | |||
2229 | error = EADDRNOTAVAIL49; | |||
2230 | goto out_imo_locked; | |||
2231 | } | |||
2232 | } else { | |||
2233 | /* | |||
2234 | * MCAST_JOIN_GROUP on an existing exclusive | |||
2235 | * membership is an error; return EADDRINUSE | |||
2236 | * to preserve 4.4BSD API idempotence, and | |||
2237 | * avoid tedious detour to code below. | |||
2238 | * NOTE: This is bending RFC 3678 a bit. | |||
2239 | * | |||
2240 | * On an existing inclusive membership, this is also | |||
2241 | * an error; if you want to change filter mode, | |||
2242 | * you must use the userland API setsourcefilter(). | |||
2243 | * XXX We don't reject this for imf in UNDEFINED | |||
2244 | * state at t1, because allocation of a filter | |||
2245 | * is atomic with allocation of a membership. | |||
2246 | */ | |||
2247 | error = EINVAL22; | |||
2248 | /* See comments above for EADDRINUSE */ | |||
2249 | if (imf->imf_st[1] == MCAST_EXCLUDE2) | |||
2250 | error = EADDRINUSE48; | |||
2251 | goto out_imo_locked; | |||
2252 | } | |||
2253 | } | |||
2254 | ||||
2255 | /* | |||
2256 | * Begin state merge transaction at socket layer. | |||
2257 | */ | |||
2258 | ||||
2259 | if (is_new) { | |||
2260 | if (imo->imo_num_memberships == imo->imo_max_memberships) { | |||
2261 | error = imo_grow(imo, 0); | |||
2262 | if (error) | |||
2263 | goto out_imo_locked; | |||
2264 | } | |||
2265 | /* | |||
2266 | * Allocate the new slot upfront so we can deal with | |||
2267 | * grafting the new source filter in same code path | |||
2268 | * as for join-source on existing membership. | |||
2269 | */ | |||
2270 | idx = imo->imo_num_memberships; | |||
2271 | imo->imo_membership[idx] = NULL((void *)0); | |||
2272 | imo->imo_num_memberships++; | |||
2273 | VERIFY(imo->imo_mfilters != NULL)((void)(__builtin_expect(!!((long)((imo->imo_mfilters != ( (void *)0)))), 1L) || assfail("imo->imo_mfilters != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 2273 ))); | |||
2274 | imf = &imo->imo_mfilters[idx]; | |||
2275 | VERIFY(RB_EMPTY(&imf->imf_sources))((void)(__builtin_expect(!!((long)((((&imf->imf_sources )->rbh_root == ((void *)0))))), 1L) || assfail("RB_EMPTY(&imf->imf_sources)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 2275 ))); | |||
2276 | } | |||
2277 | ||||
2278 | /* | |||
2279 | * Graft new source into filter list for this inpcb's | |||
2280 | * membership of the group. The in_multi may not have | |||
2281 | * been allocated yet if this is a new membership, however, | |||
2282 | * the in_mfilter slot will be allocated and must be initialized. | |||
2283 | */ | |||
2284 | if (ssa->ss.ss_family != AF_UNSPEC0) { | |||
2285 | /* Membership starts in IN mode */ | |||
2286 | if (is_new) { | |||
2287 | IGMP_PRINTF(("%s: new join w/source\n", __func__))do { if (igmp_debug) printf ("%s: new join w/source\n", __func__ ); } while (0); | |||
2288 | imf_init(imf, MCAST_UNDEFINED0, MCAST_INCLUDE1); | |||
2289 | } else { | |||
2290 | IGMP_PRINTF(("%s: %s source\n", __func__, "allow"))do { if (igmp_debug) printf ("%s: %s source\n", __func__, "allow" ); } while (0); | |||
2291 | } | |||
2292 | lims = imf_graft(imf, MCAST_INCLUDE1, &ssa->sin); | |||
2293 | if (lims == NULL((void *)0)) { | |||
2294 | IGMP_PRINTF(("%s: merge imf state failed\n",do { if (igmp_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0) | |||
2295 | __func__))do { if (igmp_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
2296 | error = ENOMEM12; | |||
2297 | goto out_imo_free; | |||
2298 | } | |||
2299 | } else { | |||
2300 | /* No address specified; Membership starts in EX mode */ | |||
2301 | if (is_new) { | |||
2302 | IGMP_PRINTF(("%s: new join w/o source\n", __func__))do { if (igmp_debug) printf ("%s: new join w/o source\n", __func__ ); } while (0); | |||
2303 | imf_init(imf, MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
2304 | } | |||
2305 | } | |||
2306 | ||||
2307 | /* | |||
2308 | * Begin state merge transaction at IGMP layer. | |||
2309 | */ | |||
2310 | if (is_new) { | |||
2311 | /* | |||
2312 | * Unlock socket as we may end up calling ifnet_ioctl() to join (or leave) | |||
2313 | * the multicast group and we run the risk of a lock ordering issue | |||
2314 | * if the ifnet thread calls into the socket layer to acquire the pcb list | |||
2315 | * lock while the input thread delivers multicast packets | |||
2316 | */ | |||
2317 | IMO_ADDREF_LOCKED(imo)imo_addref(imo, 1); | |||
2318 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2319 | socket_unlock(inp->inp_socket, 0); | |||
2320 | ||||
2321 | VERIFY(inm == NULL)((void)(__builtin_expect(!!((long)((inm == ((void *)0)))), 1L ) || assfail("inm == NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 2321))); | |||
2322 | error = in_joingroup(ifp, &gsa->sin.sin_addr, imf, &inm); | |||
2323 | ||||
2324 | socket_lock(inp->inp_socket, 0); | |||
2325 | IMO_REMREF(imo)imo_remref(imo); | |||
2326 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2327 | ||||
2328 | VERIFY(inm != NULL || error != 0)((void)(__builtin_expect(!!((long)((inm != ((void *)0) || error != 0))), 1L) || assfail("inm != NULL || error != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 2328))); | |||
2329 | if (error) | |||
2330 | goto out_imo_free; | |||
2331 | imo->imo_membership[idx] = inm; /* from in_joingroup() */ | |||
2332 | } else { | |||
2333 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2334 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
2335 | error = inm_merge(inm, imf); | |||
2336 | if (error) { | |||
2337 | IGMP_PRINTF(("%s: failed to merge inm state\n",do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0) | |||
2338 | __func__))do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2339 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2340 | goto out_imf_rollback; | |||
2341 | } | |||
2342 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
2343 | error = igmp_change_state(inm, &itp); | |||
2344 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2345 | if (error) { | |||
2346 | IGMP_PRINTF(("%s: failed igmp downcall\n",do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0) | |||
2347 | __func__))do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0); | |||
2348 | goto out_imf_rollback; | |||
2349 | } | |||
2350 | } | |||
2351 | ||||
2352 | out_imf_rollback: | |||
2353 | if (error) { | |||
2354 | imf_rollback(imf); | |||
2355 | if (is_new) | |||
2356 | imf_purge(imf); | |||
2357 | else | |||
2358 | imf_reap(imf); | |||
2359 | } else { | |||
2360 | imf_commit(imf); | |||
2361 | } | |||
2362 | ||||
2363 | out_imo_free: | |||
2364 | if (error && is_new) { | |||
2365 | VERIFY(inm == NULL)((void)(__builtin_expect(!!((long)((inm == ((void *)0)))), 1L ) || assfail("inm == NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 2365))); | |||
2366 | imo->imo_membership[idx] = NULL((void *)0); | |||
2367 | --imo->imo_num_memberships; | |||
2368 | } | |||
2369 | ||||
2370 | out_imo_locked: | |||
2371 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2372 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2373 | ||||
2374 | /* schedule timer now that we've dropped the lock(s) */ | |||
2375 | igmp_set_timeout(&itp); | |||
2376 | ||||
2377 | return (error); | |||
2378 | } | |||
2379 | ||||
2380 | /* | |||
2381 | * Leave an IPv4 multicast group on an inpcb, possibly with a source. | |||
2382 | * | |||
2383 | * NB: sopt->sopt_val might point to the kernel address space. Refer to the | |||
2384 | * block comment on top of inp_join_group() for more information. | |||
2385 | */ | |||
2386 | int | |||
2387 | inp_leave_group(struct inpcb *inp, struct sockopt *sopt) | |||
2388 | { | |||
2389 | struct group_source_req gsr; | |||
2390 | struct ip_mreq_source mreqs; | |||
2391 | sockunion_t *gsa, *ssa; | |||
2392 | struct ifnet *ifp; | |||
2393 | struct in_mfilter *imf; | |||
2394 | struct ip_moptions *imo; | |||
2395 | struct in_msource *ims; | |||
2396 | struct in_multi *inm = NULL((void *)0); | |||
2397 | size_t idx; | |||
2398 | int error, is_final; | |||
2399 | unsigned int ifindex = 0; | |||
2400 | struct igmp_tparams itp; | |||
2401 | ||||
2402 | bzero(&itp, sizeof (itp)); | |||
2403 | ifp = NULL((void *)0); | |||
2404 | error = 0; | |||
2405 | is_final = 1; | |||
2406 | ||||
2407 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
2408 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
2409 | gsa->ss.ss_family = AF_UNSPEC0; | |||
2410 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
2411 | ssa->ss.ss_family = AF_UNSPEC0; | |||
2412 | ||||
2413 | switch (sopt->sopt_name) { | |||
2414 | case IP_DROP_MEMBERSHIP13: | |||
2415 | case IP_DROP_SOURCE_MEMBERSHIP71: | |||
2416 | if (sopt->sopt_name == IP_DROP_MEMBERSHIP13) { | |||
2417 | error = sooptcopyin(sopt, &mreqs, | |||
2418 | sizeof(struct ip_mreq), | |||
2419 | sizeof(struct ip_mreq)); | |||
2420 | /* | |||
2421 | * Swap interface and sourceaddr arguments, | |||
2422 | * as ip_mreq and ip_mreq_source are laid | |||
2423 | * out differently. | |||
2424 | */ | |||
2425 | mreqs.imr_interface = mreqs.imr_sourceaddr; | |||
2426 | mreqs.imr_sourceaddr.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
2427 | } else if (sopt->sopt_name == IP_DROP_SOURCE_MEMBERSHIP71) { | |||
2428 | error = sooptcopyin(sopt, &mreqs, | |||
2429 | sizeof(struct ip_mreq_source), | |||
2430 | sizeof(struct ip_mreq_source)); | |||
2431 | } | |||
2432 | if (error) | |||
2433 | return (error); | |||
2434 | ||||
2435 | gsa->sin.sin_family = AF_INET2; | |||
2436 | gsa->sin.sin_len = sizeof(struct sockaddr_in); | |||
2437 | gsa->sin.sin_addr = mreqs.imr_multiaddr; | |||
2438 | ||||
2439 | if (sopt->sopt_name == IP_DROP_SOURCE_MEMBERSHIP71) { | |||
2440 | ssa->sin.sin_family = AF_INET2; | |||
2441 | ssa->sin.sin_len = sizeof(struct sockaddr_in); | |||
2442 | ssa->sin.sin_addr = mreqs.imr_sourceaddr; | |||
2443 | } | |||
2444 | /* | |||
2445 | * Attempt to look up hinted ifp from interface address. | |||
2446 | * Fallthrough with null ifp iff lookup fails, to | |||
2447 | * preserve 4.4BSD mcast API idempotence. | |||
2448 | * XXX NOTE WELL: The RFC 3678 API is preferred because | |||
2449 | * using an IPv4 address as a key is racy. | |||
2450 | */ | |||
2451 | if (!in_nullhost(mreqs.imr_interface)((mreqs.imr_interface).s_addr == (u_int32_t)0x00000000)) | |||
2452 | ifp = ip_multicast_if(&mreqs.imr_interface, &ifindex); | |||
2453 | ||||
2454 | IGMP_INET_PRINTF(mreqs.imr_interface,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
2455 | ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0) | |||
2456 | _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (mreqs.imr_interface), _igmp_inet_buf, sizeof(_igmp_inet_buf) ); printf ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__ , _igmp_inet_buf, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm)); } } while ( 0); | |||
2457 | ||||
2458 | break; | |||
2459 | ||||
2460 | case MCAST_LEAVE_GROUP81: | |||
2461 | case MCAST_LEAVE_SOURCE_GROUP83: | |||
2462 | if (sopt->sopt_name == MCAST_LEAVE_GROUP81) { | |||
2463 | error = sooptcopyin(sopt, &gsr, | |||
2464 | sizeof(struct group_req), | |||
2465 | sizeof(struct group_req)); | |||
2466 | } else if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP83) { | |||
2467 | error = sooptcopyin(sopt, &gsr, | |||
2468 | sizeof(struct group_source_req), | |||
2469 | sizeof(struct group_source_req)); | |||
2470 | } | |||
2471 | if (error) | |||
2472 | return (error); | |||
2473 | ||||
2474 | if (gsa->sin.sin_family != AF_INET2 || | |||
2475 | gsa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
2476 | return (EINVAL22); | |||
2477 | ||||
2478 | if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP83) { | |||
2479 | if (ssa->sin.sin_family != AF_INET2 || | |||
2480 | ssa->sin.sin_len != sizeof(struct sockaddr_in)) | |||
2481 | return (EINVAL22); | |||
2482 | } | |||
2483 | ||||
2484 | ifnet_head_lock_shared(); | |||
2485 | if (gsr.gsr_interface == 0 || | |||
2486 | (u_int)if_index < gsr.gsr_interface) { | |||
2487 | ifnet_head_done(); | |||
2488 | return (EADDRNOTAVAIL49); | |||
2489 | } | |||
2490 | ||||
2491 | ifp = ifindex2ifnet[gsr.gsr_interface]; | |||
2492 | ifnet_head_done(); | |||
2493 | break; | |||
2494 | ||||
2495 | default: | |||
2496 | IGMP_PRINTF(("%s: unknown sopt_name %d\n",do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
2497 | __func__, sopt->sopt_name))do { if (igmp_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
2498 | return (EOPNOTSUPP102); | |||
2499 | } | |||
2500 | ||||
2501 | if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr))(((u_int32_t)((__builtin_constant_p(gsa->sin.sin_addr.s_addr ) ? ((__uint32_t)((((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(gsa->sin. sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(gsa->sin.sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsa->sin.sin_addr.s_addr)) ) & 0xf0000000) == 0xe0000000)) | |||
2502 | return (EINVAL22); | |||
2503 | ||||
2504 | /* | |||
2505 | * Find the membership in the membership array. | |||
2506 | */ | |||
2507 | imo = inp_findmoptions(inp); | |||
2508 | if (imo == NULL((void *)0)) | |||
2509 | return (ENOMEM12); | |||
2510 | ||||
2511 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2512 | idx = imo_match_group(imo, ifp, &gsa->sa); | |||
2513 | if (idx == (size_t)-1) { | |||
2514 | error = EADDRNOTAVAIL49; | |||
2515 | goto out_locked; | |||
2516 | } | |||
2517 | inm = imo->imo_membership[idx]; | |||
2518 | imf = &imo->imo_mfilters[idx]; | |||
2519 | ||||
2520 | if (ssa->ss.ss_family != AF_UNSPEC0) { | |||
2521 | IGMP_PRINTF(("%s: opt=%d is_final=0\n", __func__,do { if (igmp_debug) printf ("%s: opt=%d is_final=0\n", __func__ , sopt->sopt_name); } while (0) | |||
2522 | sopt->sopt_name))do { if (igmp_debug) printf ("%s: opt=%d is_final=0\n", __func__ , sopt->sopt_name); } while (0); | |||
2523 | is_final = 0; | |||
2524 | } | |||
2525 | ||||
2526 | /* | |||
2527 | * Begin state merge transaction at socket layer. | |||
2528 | */ | |||
2529 | ||||
2530 | /* | |||
2531 | * If we were instructed only to leave a given source, do so. | |||
2532 | * MCAST_LEAVE_SOURCE_GROUP is only valid for inclusive memberships. | |||
2533 | */ | |||
2534 | if (is_final) { | |||
2535 | imf_leave(imf); | |||
2536 | } else { | |||
2537 | if (imf->imf_st[0] == MCAST_EXCLUDE2) { | |||
2538 | error = EADDRNOTAVAIL49; | |||
2539 | goto out_locked; | |||
2540 | } | |||
2541 | ims = imo_match_source(imo, idx, &ssa->sa); | |||
2542 | if (ims == NULL((void *)0)) { | |||
2543 | IGMP_INET_PRINTF(ssa->sin.sin_addr,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , "not "); } } while (0) | |||
2544 | ("%s: source %s %spresent\n", __func__,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , "not "); } } while (0) | |||
2545 | _igmp_inet_buf, "not "))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ssa->sin.sin_addr), _igmp_inet_buf, sizeof(_igmp_inet_buf )); printf ("%s: source %s %spresent\n", __func__, _igmp_inet_buf , "not "); } } while (0); | |||
2546 | error = EADDRNOTAVAIL49; | |||
2547 | goto out_locked; | |||
2548 | } | |||
2549 | IGMP_PRINTF(("%s: %s source\n", __func__, "block"))do { if (igmp_debug) printf ("%s: %s source\n", __func__, "block" ); } while (0); | |||
2550 | error = imf_prune(imf, &ssa->sin); | |||
2551 | if (error) { | |||
2552 | IGMP_PRINTF(("%s: merge imf state failed\n",do { if (igmp_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0) | |||
2553 | __func__))do { if (igmp_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
2554 | goto out_locked; | |||
2555 | } | |||
2556 | } | |||
2557 | ||||
2558 | /* | |||
2559 | * Begin state merge transaction at IGMP layer. | |||
2560 | */ | |||
2561 | ||||
2562 | ||||
2563 | if (is_final) { | |||
2564 | /* | |||
2565 | * Give up the multicast address record to which | |||
2566 | * the membership points. Reference held in imo | |||
2567 | * will be released below. | |||
2568 | */ | |||
2569 | (void) in_leavegroup(inm, imf); | |||
2570 | } else { | |||
2571 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2572 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
2573 | error = inm_merge(inm, imf); | |||
2574 | if (error) { | |||
2575 | IGMP_PRINTF(("%s: failed to merge inm state\n",do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0) | |||
2576 | __func__))do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2577 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2578 | goto out_imf_rollback; | |||
2579 | } | |||
2580 | ||||
2581 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
2582 | error = igmp_change_state(inm, &itp); | |||
2583 | if (error) { | |||
2584 | IGMP_PRINTF(("%s: failed igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0); | |||
2585 | } | |||
2586 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2587 | } | |||
2588 | ||||
2589 | out_imf_rollback: | |||
2590 | if (error) | |||
2591 | imf_rollback(imf); | |||
2592 | else | |||
2593 | imf_commit(imf); | |||
2594 | ||||
2595 | imf_reap(imf); | |||
2596 | ||||
2597 | if (is_final) { | |||
2598 | /* Remove the gap in the membership array. */ | |||
2599 | VERIFY(inm == imo->imo_membership[idx])((void)(__builtin_expect(!!((long)((inm == imo->imo_membership [idx]))), 1L) || assfail("inm == imo->imo_membership[idx]" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c", 2599 ))); | |||
2600 | imo->imo_membership[idx] = NULL((void *)0); | |||
2601 | ||||
2602 | /* | |||
2603 | * See inp_join_group() for why we need to unlock | |||
2604 | */ | |||
2605 | IMO_ADDREF_LOCKED(imo)imo_addref(imo, 1); | |||
2606 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2607 | socket_unlock(inp->inp_socket, 0); | |||
2608 | ||||
2609 | INM_REMREF(inm)inm_remref(inm, 0); | |||
2610 | ||||
2611 | socket_lock(inp->inp_socket, 0); | |||
2612 | IMO_REMREF(imo)imo_remref(imo); | |||
2613 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2614 | ||||
2615 | for (++idx; idx < imo->imo_num_memberships; ++idx) { | |||
2616 | imo->imo_membership[idx-1] = imo->imo_membership[idx]; | |||
2617 | imo->imo_mfilters[idx-1] = imo->imo_mfilters[idx]; | |||
2618 | } | |||
2619 | imo->imo_num_memberships--; | |||
2620 | } | |||
2621 | ||||
2622 | out_locked: | |||
2623 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2624 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2625 | ||||
2626 | /* schedule timer now that we've dropped the lock(s) */ | |||
2627 | igmp_set_timeout(&itp); | |||
2628 | ||||
2629 | return (error); | |||
2630 | } | |||
2631 | ||||
2632 | /* | |||
2633 | * Select the interface for transmitting IPv4 multicast datagrams. | |||
2634 | * | |||
2635 | * Either an instance of struct in_addr or an instance of struct ip_mreqn | |||
2636 | * may be passed to this socket option. An address of INADDR_ANY or an | |||
2637 | * interface index of 0 is used to remove a previous selection. | |||
2638 | * When no interface is selected, one is chosen for every send. | |||
2639 | */ | |||
2640 | static int | |||
2641 | inp_set_multicast_if(struct inpcb *inp, struct sockopt *sopt) | |||
2642 | { | |||
2643 | struct in_addr addr; | |||
2644 | struct ip_mreqn mreqn; | |||
2645 | struct ifnet *ifp; | |||
2646 | struct ip_moptions *imo; | |||
2647 | int error = 0 ; | |||
2648 | unsigned int ifindex = 0; | |||
2649 | ||||
2650 | if (sopt->sopt_valsize == sizeof(struct ip_mreqn)) { | |||
2651 | /* | |||
2652 | * An interface index was specified using the | |||
2653 | * Linux-derived ip_mreqn structure. | |||
2654 | */ | |||
2655 | error = sooptcopyin(sopt, &mreqn, sizeof(struct ip_mreqn), | |||
2656 | sizeof(struct ip_mreqn)); | |||
2657 | if (error) | |||
2658 | return (error); | |||
2659 | ||||
2660 | ifnet_head_lock_shared(); | |||
2661 | if (mreqn.imr_ifindex < 0 || if_index < mreqn.imr_ifindex) { | |||
2662 | ifnet_head_done(); | |||
2663 | return (EINVAL22); | |||
2664 | } | |||
2665 | ||||
2666 | if (mreqn.imr_ifindex == 0) { | |||
2667 | ifp = NULL((void *)0); | |||
2668 | } else { | |||
2669 | ifp = ifindex2ifnet[mreqn.imr_ifindex]; | |||
2670 | if (ifp == NULL((void *)0)) { | |||
2671 | ifnet_head_done(); | |||
2672 | return (EADDRNOTAVAIL49); | |||
2673 | } | |||
2674 | } | |||
2675 | ifnet_head_done(); | |||
2676 | } else { | |||
2677 | /* | |||
2678 | * An interface was specified by IPv4 address. | |||
2679 | * This is the traditional BSD usage. | |||
2680 | */ | |||
2681 | error = sooptcopyin(sopt, &addr, sizeof(struct in_addr), | |||
2682 | sizeof(struct in_addr)); | |||
2683 | if (error) | |||
2684 | return (error); | |||
2685 | if (in_nullhost(addr)((addr).s_addr == (u_int32_t)0x00000000)) { | |||
2686 | ifp = NULL((void *)0); | |||
2687 | } else { | |||
2688 | ifp = ip_multicast_if(&addr, &ifindex); | |||
2689 | if (ifp == NULL((void *)0)) { | |||
2690 | IGMP_INET_PRINTF(addr,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: can't find ifp for addr=%s\n" , __func__, _igmp_inet_buf); } } while (0) | |||
2691 | ("%s: can't find ifp for addr=%s\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: can't find ifp for addr=%s\n" , __func__, _igmp_inet_buf); } } while (0) | |||
2692 | __func__, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (addr), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: can't find ifp for addr=%s\n" , __func__, _igmp_inet_buf); } } while (0); | |||
2693 | return (EADDRNOTAVAIL49); | |||
2694 | } | |||
2695 | } | |||
2696 | /* XXX remove? */ | |||
2697 | #ifdef IGMP_DEBUG0 | |||
2698 | IGMP_PRINTF(("%s: ifp = 0x%llx, addr = %s\n", __func__,do { if (igmp_debug) printf ("%s: ifp = 0x%llx, addr = %s\n", __func__, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm), inet_ntoa(addr )); } while (0) | |||
2699 | (uint64_t)VM_KERNEL_ADDRPERM(ifp), inet_ntoa(addr)))do { if (igmp_debug) printf ("%s: ifp = 0x%llx, addr = %s\n", __func__, (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm), inet_ntoa(addr )); } while (0); | |||
2700 | #endif | |||
2701 | } | |||
2702 | ||||
2703 | /* Reject interfaces which do not support multicast. */ | |||
2704 | if (ifp != NULL((void *)0) && (ifp->if_flags & IFF_MULTICAST0x8000) == 0) | |||
2705 | return (EOPNOTSUPP102); | |||
2706 | ||||
2707 | imo = inp_findmoptions(inp); | |||
2708 | if (imo == NULL((void *)0)) | |||
2709 | return (ENOMEM12); | |||
2710 | ||||
2711 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2712 | imo->imo_multicast_ifp = ifp; | |||
2713 | if (ifindex) | |||
2714 | imo->imo_multicast_addr = addr; | |||
2715 | else | |||
2716 | imo->imo_multicast_addr.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
2717 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2718 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2719 | ||||
2720 | return (0); | |||
2721 | } | |||
2722 | ||||
2723 | /* | |||
2724 | * Atomically set source filters on a socket for an IPv4 multicast group. | |||
2725 | */ | |||
2726 | static int | |||
2727 | inp_set_source_filters(struct inpcb *inp, struct sockopt *sopt) | |||
2728 | { | |||
2729 | struct __msfilterreq64 msfr, msfr64; | |||
2730 | struct __msfilterreq32 msfr32; | |||
2731 | sockunion_t *gsa; | |||
2732 | struct ifnet *ifp; | |||
2733 | struct in_mfilter *imf; | |||
2734 | struct ip_moptions *imo; | |||
2735 | struct in_multi *inm; | |||
2736 | size_t idx; | |||
2737 | int error; | |||
2738 | user_addr_t tmp_ptr; | |||
2739 | struct igmp_tparams itp; | |||
2740 | ||||
2741 | bzero(&itp, sizeof (itp)); | |||
2742 | ||||
2743 | if (IS_64BIT_PROCESS(current_proc())) { | |||
2744 | error = sooptcopyin(sopt, &msfr64, | |||
2745 | sizeof(struct __msfilterreq64), | |||
2746 | sizeof(struct __msfilterreq64)); | |||
2747 | if (error) | |||
2748 | return (error); | |||
2749 | /* we never use msfr.msfr_srcs; */ | |||
2750 | memcpy(&msfr, &msfr64, sizeof(msfr64)); | |||
2751 | } else { | |||
2752 | error = sooptcopyin(sopt, &msfr32, | |||
2753 | sizeof(struct __msfilterreq32), | |||
2754 | sizeof(struct __msfilterreq32)); | |||
2755 | if (error) | |||
2756 | return (error); | |||
2757 | /* we never use msfr.msfr_srcs; */ | |||
2758 | memcpy(&msfr, &msfr32, sizeof(msfr32)); | |||
2759 | } | |||
2760 | ||||
2761 | if ((size_t) msfr.msfr_nsrcs > | |||
2762 | UINT32_MAX4294967295U / sizeof(struct sockaddr_storage)) | |||
2763 | msfr.msfr_nsrcs = UINT32_MAX4294967295U / sizeof(struct sockaddr_storage); | |||
2764 | ||||
2765 | if (msfr.msfr_nsrcs > in_mcast_maxsocksrc) | |||
2766 | return (ENOBUFS55); | |||
2767 | ||||
2768 | if ((msfr.msfr_fmode != MCAST_EXCLUDE2 && | |||
2769 | msfr.msfr_fmode != MCAST_INCLUDE1)) | |||
2770 | return (EINVAL22); | |||
2771 | ||||
2772 | if (msfr.msfr_group.ss_family != AF_INET2 || | |||
2773 | msfr.msfr_group.ss_len != sizeof(struct sockaddr_in)) | |||
2774 | return (EINVAL22); | |||
2775 | ||||
2776 | gsa = (sockunion_t *)&msfr.msfr_group; | |||
2777 | if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr))(((u_int32_t)((__builtin_constant_p(gsa->sin.sin_addr.s_addr ) ? ((__uint32_t)((((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(gsa->sin. sin_addr.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(gsa->sin.sin_addr.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(gsa->sin.sin_addr.s_addr) & 0x000000ff ) << 24))) : _OSSwapInt32(gsa->sin.sin_addr.s_addr)) ) & 0xf0000000) == 0xe0000000)) | |||
2778 | return (EINVAL22); | |||
2779 | ||||
2780 | gsa->sin.sin_port = 0; /* ignore port */ | |||
2781 | ||||
2782 | ifnet_head_lock_shared(); | |||
2783 | if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) { | |||
2784 | ifnet_head_done(); | |||
2785 | return (EADDRNOTAVAIL49); | |||
2786 | } | |||
2787 | ||||
2788 | ifp = ifindex2ifnet[msfr.msfr_ifindex]; | |||
2789 | ifnet_head_done(); | |||
2790 | if (ifp == NULL((void *)0)) | |||
2791 | return (EADDRNOTAVAIL49); | |||
2792 | ||||
2793 | /* | |||
2794 | * Check if this socket is a member of this group. | |||
2795 | */ | |||
2796 | imo = inp_findmoptions(inp); | |||
2797 | if (imo == NULL((void *)0)) | |||
2798 | return (ENOMEM12); | |||
2799 | ||||
2800 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2801 | idx = imo_match_group(imo, ifp, &gsa->sa); | |||
2802 | if (idx == (size_t)-1 || imo->imo_mfilters == NULL((void *)0)) { | |||
2803 | error = EADDRNOTAVAIL49; | |||
2804 | goto out_imo_locked; | |||
2805 | } | |||
2806 | inm = imo->imo_membership[idx]; | |||
2807 | imf = &imo->imo_mfilters[idx]; | |||
2808 | ||||
2809 | /* | |||
2810 | * Begin state merge transaction at socket layer. | |||
2811 | */ | |||
2812 | ||||
2813 | imf->imf_st[1] = msfr.msfr_fmode; | |||
2814 | ||||
2815 | /* | |||
2816 | * Apply any new source filters, if present. | |||
2817 | * Make a copy of the user-space source vector so | |||
2818 | * that we may copy them with a single copyin. This | |||
2819 | * allows us to deal with page faults up-front. | |||
2820 | */ | |||
2821 | if (msfr.msfr_nsrcs > 0) { | |||
2822 | struct in_msource *lims; | |||
2823 | struct sockaddr_in *psin; | |||
2824 | struct sockaddr_storage *kss, *pkss; | |||
2825 | int i; | |||
2826 | ||||
2827 | if (IS_64BIT_PROCESS(current_proc())) | |||
2828 | tmp_ptr = msfr64.msfr_srcs; | |||
2829 | else | |||
2830 | tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs)((user_addr_t)((uintptr_t)(msfr32.msfr_srcs))); | |||
2831 | ||||
2832 | IGMP_PRINTF(("%s: loading %lu source list entries\n",do { if (igmp_debug) printf ("%s: loading %lu source list entries\n" , __func__, (unsigned long)msfr.msfr_nsrcs); } while (0) | |||
2833 | __func__, (unsigned long)msfr.msfr_nsrcs))do { if (igmp_debug) printf ("%s: loading %lu source list entries\n" , __func__, (unsigned long)msfr.msfr_nsrcs); } while (0); | |||
2834 | kss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss),({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss), 80, 0x0000 , &site); }) | |||
2835 | M_TEMP, M_WAITOK)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss), 80, 0x0000 , &site); }); | |||
2836 | if (kss == NULL((void *)0)) { | |||
2837 | error = ENOMEM12; | |||
2838 | goto out_imo_locked; | |||
2839 | } | |||
2840 | error = copyin(tmp_ptr, kss, | |||
2841 | (size_t) msfr.msfr_nsrcs * sizeof(*kss)); | |||
2842 | if (error) { | |||
2843 | FREE(kss, M_TEMP)_FREE((void *)kss, 80); | |||
2844 | goto out_imo_locked; | |||
2845 | } | |||
2846 | ||||
2847 | /* | |||
2848 | * Mark all source filters as UNDEFINED at t1. | |||
2849 | * Restore new group filter mode, as imf_leave() | |||
2850 | * will set it to INCLUDE. | |||
2851 | */ | |||
2852 | imf_leave(imf); | |||
2853 | imf->imf_st[1] = msfr.msfr_fmode; | |||
2854 | ||||
2855 | /* | |||
2856 | * Update socket layer filters at t1, lazy-allocating | |||
2857 | * new entries. This saves a bunch of memory at the | |||
2858 | * cost of one RB_FIND() per source entry; duplicate | |||
2859 | * entries in the msfr_nsrcs vector are ignored. | |||
2860 | * If we encounter an error, rollback transaction. | |||
2861 | * | |||
2862 | * XXX This too could be replaced with a set-symmetric | |||
2863 | * difference like loop to avoid walking from root | |||
2864 | * every time, as the key space is common. | |||
2865 | */ | |||
2866 | for (i = 0, pkss = kss; (u_int)i < msfr.msfr_nsrcs; | |||
2867 | i++, pkss++) { | |||
2868 | psin = (struct sockaddr_in *)pkss; | |||
2869 | if (psin->sin_family != AF_INET2) { | |||
2870 | error = EAFNOSUPPORT47; | |||
2871 | break; | |||
2872 | } | |||
2873 | if (psin->sin_len != sizeof(struct sockaddr_in)) { | |||
2874 | error = EINVAL22; | |||
2875 | break; | |||
2876 | } | |||
2877 | error = imf_get_source(imf, psin, &lims); | |||
2878 | if (error) | |||
2879 | break; | |||
2880 | lims->imsl_st[1] = imf->imf_st[1]; | |||
2881 | } | |||
2882 | FREE(kss, M_TEMP)_FREE((void *)kss, 80); | |||
2883 | } | |||
2884 | ||||
2885 | if (error) | |||
2886 | goto out_imf_rollback; | |||
2887 | ||||
2888 | /* | |||
2889 | * Begin state merge transaction at IGMP layer. | |||
2890 | */ | |||
2891 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
2892 | IGMP_PRINTF(("%s: merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2893 | error = inm_merge(inm, imf); | |||
2894 | if (error) { | |||
2895 | IGMP_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (igmp_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2896 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2897 | goto out_imf_rollback; | |||
2898 | } | |||
2899 | ||||
2900 | IGMP_PRINTF(("%s: doing igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: doing igmp downcall\n", __func__ ); } while (0); | |||
2901 | error = igmp_change_state(inm, &itp); | |||
2902 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
2903 | #ifdef IGMP_DEBUG1 | |||
2904 | if (error) | |||
2905 | IGMP_PRINTF(("%s: failed igmp downcall\n", __func__))do { if (igmp_debug) printf ("%s: failed igmp downcall\n", __func__ ); } while (0); | |||
2906 | #endif | |||
2907 | ||||
2908 | out_imf_rollback: | |||
2909 | if (error) | |||
2910 | imf_rollback(imf); | |||
2911 | else | |||
2912 | imf_commit(imf); | |||
2913 | ||||
2914 | imf_reap(imf); | |||
2915 | ||||
2916 | out_imo_locked: | |||
2917 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2918 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2919 | ||||
2920 | /* schedule timer now that we've dropped the lock(s) */ | |||
2921 | igmp_set_timeout(&itp); | |||
2922 | ||||
2923 | return (error); | |||
2924 | } | |||
2925 | ||||
2926 | /* | |||
2927 | * Set the IP multicast options in response to user setsockopt(). | |||
2928 | * | |||
2929 | * Many of the socket options handled in this function duplicate the | |||
2930 | * functionality of socket options in the regular unicast API. However, | |||
2931 | * it is not possible to merge the duplicate code, because the idempotence | |||
2932 | * of the IPv4 multicast part of the BSD Sockets API must be preserved; | |||
2933 | * the effects of these options must be treated as separate and distinct. | |||
2934 | */ | |||
2935 | int | |||
2936 | inp_setmoptions(struct inpcb *inp, struct sockopt *sopt) | |||
2937 | { | |||
2938 | struct ip_moptions *imo; | |||
2939 | int error; | |||
2940 | unsigned int ifindex; | |||
2941 | struct ifnet *ifp; | |||
2942 | ||||
2943 | error = 0; | |||
2944 | ||||
2945 | /* | |||
2946 | * If socket is neither of type SOCK_RAW or SOCK_DGRAM, | |||
2947 | * or is a divert socket, reject it. | |||
2948 | */ | |||
2949 | if (SOCK_PROTO(inp->inp_socket)((inp->inp_socket)->so_proto->pr_protocol) == IPPROTO_DIVERT254 || | |||
2950 | (SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_RAW3 && | |||
2951 | SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_DGRAM2)) | |||
2952 | return (EOPNOTSUPP102); | |||
2953 | ||||
2954 | switch (sopt->sopt_name) { | |||
2955 | case IP_MULTICAST_IF9: | |||
2956 | error = inp_set_multicast_if(inp, sopt); | |||
2957 | break; | |||
2958 | ||||
2959 | case IP_MULTICAST_IFINDEX66: | |||
2960 | /* | |||
2961 | * Select the interface for outgoing multicast packets. | |||
2962 | */ | |||
2963 | error = sooptcopyin(sopt, &ifindex, sizeof (ifindex), | |||
2964 | sizeof (ifindex)); | |||
2965 | if (error) | |||
2966 | break; | |||
2967 | ||||
2968 | imo = inp_findmoptions(inp); | |||
2969 | if (imo == NULL((void *)0)) { | |||
2970 | error = ENOMEM12; | |||
2971 | break; | |||
2972 | } | |||
2973 | /* | |||
2974 | * Index 0 is used to remove a previous selection. | |||
2975 | * When no interface is selected, a default one is | |||
2976 | * chosen every time a multicast packet is sent. | |||
2977 | */ | |||
2978 | if (ifindex == 0) { | |||
2979 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
2980 | imo->imo_multicast_ifp = NULL((void *)0); | |||
2981 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
2982 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2983 | break; | |||
2984 | } | |||
2985 | ||||
2986 | ifnet_head_lock_shared(); | |||
2987 | /* Don't need to check is ifindex is < 0 since it's unsigned */ | |||
2988 | if ((unsigned int)if_index < ifindex) { | |||
2989 | ifnet_head_done(); | |||
2990 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
2991 | error = ENXIO6; /* per IPV6_MULTICAST_IF */ | |||
2992 | break; | |||
2993 | } | |||
2994 | ifp = ifindex2ifnet[ifindex]; | |||
2995 | ifnet_head_done(); | |||
2996 | ||||
2997 | /* If it's detached or isn't a multicast interface, bail out */ | |||
2998 | if (ifp == NULL((void *)0) || !(ifp->if_flags & IFF_MULTICAST0x8000)) { | |||
2999 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
3000 | error = EADDRNOTAVAIL49; | |||
3001 | break; | |||
3002 | } | |||
3003 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
3004 | imo->imo_multicast_ifp = ifp; | |||
3005 | /* | |||
3006 | * Clear out any remnants of past IP_MULTICAST_IF. The addr | |||
3007 | * isn't really used anywhere in the kernel; we could have | |||
3008 | * iterated thru the addresses of the interface and pick one | |||
3009 | * here, but that is redundant since ip_getmoptions() already | |||
3010 | * takes care of that for INADDR_ANY. | |||
3011 | */ | |||
3012 | imo->imo_multicast_addr.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
3013 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
3014 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
3015 | break; | |||
3016 | ||||
3017 | case IP_MULTICAST_TTL10: { | |||
3018 | u_char ttl; | |||
3019 | ||||
3020 | /* | |||
3021 | * Set the IP time-to-live for outgoing multicast packets. | |||
3022 | * The original multicast API required a char argument, | |||
3023 | * which is inconsistent with the rest of the socket API. | |||
3024 | * We allow either a char or an int. | |||
3025 | */ | |||
3026 | if (sopt->sopt_valsize == sizeof(u_char)) { | |||
3027 | error = sooptcopyin(sopt, &ttl, sizeof(u_char), | |||
3028 | sizeof(u_char)); | |||
3029 | if (error) | |||
3030 | break; | |||
3031 | } else { | |||
3032 | u_int ittl; | |||
3033 | ||||
3034 | error = sooptcopyin(sopt, &ittl, sizeof(u_int), | |||
3035 | sizeof(u_int)); | |||
3036 | if (error) | |||
3037 | break; | |||
3038 | if (ittl > 255) { | |||
3039 | error = EINVAL22; | |||
3040 | break; | |||
3041 | } | |||
3042 | ttl = (u_char)ittl; | |||
3043 | } | |||
3044 | imo = inp_findmoptions(inp); | |||
3045 | if (imo == NULL((void *)0)) { | |||
3046 | error = ENOMEM12; | |||
3047 | break; | |||
3048 | } | |||
3049 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
3050 | imo->imo_multicast_ttl = ttl; | |||
3051 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
3052 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
3053 | break; | |||
3054 | } | |||
3055 | ||||
3056 | case IP_MULTICAST_LOOP11: { | |||
3057 | u_char loop; | |||
3058 | ||||
3059 | /* | |||
3060 | * Set the loopback flag for outgoing multicast packets. | |||
3061 | * Must be zero or one. The original multicast API required a | |||
3062 | * char argument, which is inconsistent with the rest | |||
3063 | * of the socket API. We allow either a char or an int. | |||
3064 | */ | |||
3065 | if (sopt->sopt_valsize == sizeof(u_char)) { | |||
3066 | error = sooptcopyin(sopt, &loop, sizeof(u_char), | |||
3067 | sizeof(u_char)); | |||
3068 | if (error) | |||
3069 | break; | |||
3070 | } else { | |||
3071 | u_int iloop; | |||
3072 | ||||
3073 | error = sooptcopyin(sopt, &iloop, sizeof(u_int), | |||
3074 | sizeof(u_int)); | |||
3075 | if (error) | |||
3076 | break; | |||
3077 | loop = (u_char)iloop; | |||
3078 | } | |||
3079 | imo = inp_findmoptions(inp); | |||
3080 | if (imo == NULL((void *)0)) { | |||
3081 | error = ENOMEM12; | |||
3082 | break; | |||
3083 | } | |||
3084 | IMO_LOCK(imo)lck_mtx_lock(&(imo)->imo_lock); | |||
3085 | imo->imo_multicast_loop = !!loop; | |||
3086 | IMO_UNLOCK(imo)lck_mtx_unlock(&(imo)->imo_lock); | |||
3087 | IMO_REMREF(imo)imo_remref(imo); /* from inp_findmoptions() */ | |||
3088 | break; | |||
3089 | } | |||
3090 | ||||
3091 | case IP_ADD_MEMBERSHIP12: | |||
3092 | case IP_ADD_SOURCE_MEMBERSHIP70: | |||
3093 | case MCAST_JOIN_GROUP80: | |||
3094 | case MCAST_JOIN_SOURCE_GROUP82: | |||
3095 | error = inp_join_group(inp, sopt); | |||
3096 | break; | |||
3097 | ||||
3098 | case IP_DROP_MEMBERSHIP13: | |||
3099 | case IP_DROP_SOURCE_MEMBERSHIP71: | |||
3100 | case MCAST_LEAVE_GROUP81: | |||
3101 | case MCAST_LEAVE_SOURCE_GROUP83: | |||
3102 | error = inp_leave_group(inp, sopt); | |||
3103 | break; | |||
3104 | ||||
3105 | case IP_BLOCK_SOURCE72: | |||
3106 | case IP_UNBLOCK_SOURCE73: | |||
3107 | case MCAST_BLOCK_SOURCE84: | |||
3108 | case MCAST_UNBLOCK_SOURCE85: | |||
3109 | error = inp_block_unblock_source(inp, sopt); | |||
3110 | break; | |||
3111 | ||||
3112 | case IP_MSFILTER74: | |||
3113 | error = inp_set_source_filters(inp, sopt); | |||
3114 | break; | |||
3115 | ||||
3116 | default: | |||
3117 | error = EOPNOTSUPP102; | |||
3118 | break; | |||
3119 | } | |||
3120 | ||||
3121 | return (error); | |||
3122 | } | |||
3123 | ||||
3124 | /* | |||
3125 | * Expose IGMP's multicast filter mode and source list(s) to userland, | |||
3126 | * keyed by (ifindex, group). | |||
3127 | * The filter mode is written out as a uint32_t, followed by | |||
3128 | * 0..n of struct in_addr. | |||
3129 | * For use by ifmcstat(8). | |||
3130 | */ | |||
3131 | static int | |||
3132 | sysctl_ip_mcast_filters SYSCTL_HANDLER_ARGS(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req) | |||
3133 | { | |||
3134 | #pragma unused(oidp) | |||
3135 | ||||
3136 | struct in_addr src, group; | |||
3137 | struct ifnet *ifp; | |||
3138 | struct in_multi *inm; | |||
3139 | struct in_multistep step; | |||
3140 | struct ip_msource *ims; | |||
3141 | int *name; | |||
3142 | int retval = 0; | |||
3143 | u_int namelen; | |||
3144 | uint32_t fmode, ifindex; | |||
3145 | ||||
3146 | name = (int *)arg1; | |||
3147 | namelen = (u_int)arg2; | |||
3148 | ||||
3149 | if (req->newptr != USER_ADDR_NULL((user_addr_t) 0)) | |||
3150 | return (EPERM1); | |||
3151 | ||||
3152 | if (namelen != 2) | |||
3153 | return (EINVAL22); | |||
3154 | ||||
3155 | ifindex = name[0]; | |||
3156 | ifnet_head_lock_shared(); | |||
3157 | if (ifindex <= 0 || ifindex > (u_int)if_index) { | |||
3158 | IGMP_PRINTF(("%s: ifindex %u out of range\n",do { if (igmp_debug) printf ("%s: ifindex %u out of range\n", __func__, ifindex); } while (0) | |||
3159 | __func__, ifindex))do { if (igmp_debug) printf ("%s: ifindex %u out of range\n", __func__, ifindex); } while (0); | |||
3160 | ifnet_head_done(); | |||
3161 | return (ENOENT2); | |||
3162 | } | |||
3163 | ||||
3164 | group.s_addr = name[1]; | |||
3165 | if (!IN_MULTICAST(ntohl(group.s_addr))(((u_int32_t)((__builtin_constant_p(group.s_addr) ? ((__uint32_t )((((__uint32_t)(group.s_addr) & 0xff000000) >> 24) | (((__uint32_t)(group.s_addr) & 0x00ff0000) >> 8) | (((__uint32_t)(group.s_addr) & 0x0000ff00) << 8) | (((__uint32_t)(group.s_addr) & 0x000000ff) << 24 ))) : _OSSwapInt32(group.s_addr))) & 0xf0000000) == 0xe0000000 )) { | |||
3166 | IGMP_INET_PRINTF(group,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (group), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: group %s is not multicast\n" , __func__, _igmp_inet_buf); } } while (0) | |||
3167 | ("%s: group %s is not multicast\n",do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (group), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: group %s is not multicast\n" , __func__, _igmp_inet_buf); } } while (0) | |||
3168 | __func__, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (group), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: group %s is not multicast\n" , __func__, _igmp_inet_buf); } } while (0); | |||
3169 | ifnet_head_done(); | |||
3170 | return (EINVAL22); | |||
3171 | } | |||
3172 | ||||
3173 | ifp = ifindex2ifnet[ifindex]; | |||
3174 | ifnet_head_done(); | |||
3175 | if (ifp == NULL((void *)0)) { | |||
3176 | IGMP_PRINTF(("%s: no ifp for ifindex %u\n", __func__, ifindex))do { if (igmp_debug) printf ("%s: no ifp for ifindex %u\n", __func__ , ifindex); } while (0); | |||
3177 | return (ENOENT2); | |||
3178 | } | |||
3179 | ||||
3180 | in_multihead_lock_shared(); | |||
3181 | IN_FIRST_MULTI(step, inm)do { in_multihead_lock_assert(0x03); (step).i_inm = ((&in_multihead )->lh_first); do { in_multihead_lock_assert(0x03); if (((( inm)) = ((step)).i_inm) != ((void *)0)) ((step)).i_inm = (((( step)).i_inm)->inm_link.le_next); } while (0); } while (0); | |||
3182 | while (inm != NULL((void *)0)) { | |||
3183 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
3184 | if (inm->inm_ifp != ifp) | |||
3185 | goto next; | |||
3186 | ||||
3187 | if (!in_hosteq(inm->inm_addr, group)((inm->inm_addr).s_addr == (group).s_addr)) | |||
3188 | goto next; | |||
3189 | ||||
3190 | fmode = inm->inm_st[1].iss_fmode; | |||
3191 | retval = SYSCTL_OUT(req, &fmode, sizeof(uint32_t))(req->oldfunc)(req, &fmode, sizeof(uint32_t)); | |||
3192 | if (retval != 0) { | |||
3193 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3194 | break; /* abort */ | |||
3195 | } | |||
3196 | RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs)for ((ims) = ip_msource_tree_RB_MINMAX(&inm->inm_srcs, -1); (ims) != ((void *)0); (ims) = ip_msource_tree_RB_NEXT(ims )) { | |||
3197 | #ifdef IGMP_DEBUG1 | |||
3198 | struct in_addr ina; | |||
3199 | ina.s_addr = htonl(ims->ims_haddr)(__builtin_constant_p(ims->ims_haddr) ? ((__uint32_t)((((__uint32_t )(ims->ims_haddr) & 0xff000000) >> 24) | (((__uint32_t )(ims->ims_haddr) & 0x00ff0000) >> 8) | (((__uint32_t )(ims->ims_haddr) & 0x0000ff00) << 8) | (((__uint32_t )(ims->ims_haddr) & 0x000000ff) << 24))) : _OSSwapInt32 (ims->ims_haddr)); | |||
3200 | IGMP_INET_PRINTF(ina,do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ina), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: visit node %s\n" , __func__, _igmp_inet_buf); } } while (0) | |||
3201 | ("%s: visit node %s\n", __func__, _igmp_inet_buf))do { if (igmp_debug) { char _igmp_inet_buf[16]; inet_ntop(2, & (ina), _igmp_inet_buf, sizeof(_igmp_inet_buf)); printf ("%s: visit node %s\n" , __func__, _igmp_inet_buf); } } while (0); | |||
3202 | #endif | |||
3203 | /* | |||
3204 | * Only copy-out sources which are in-mode. | |||
3205 | */ | |||
3206 | if (fmode != ims_get_mode(inm, ims, 1)) { | |||
3207 | IGMP_PRINTF(("%s: skip non-in-mode\n",do { if (igmp_debug) printf ("%s: skip non-in-mode\n", __func__ ); } while (0) | |||
3208 | __func__))do { if (igmp_debug) printf ("%s: skip non-in-mode\n", __func__ ); } while (0); | |||
3209 | continue; /* process next source */ | |||
3210 | } | |||
3211 | src.s_addr = htonl(ims->ims_haddr)(__builtin_constant_p(ims->ims_haddr) ? ((__uint32_t)((((__uint32_t )(ims->ims_haddr) & 0xff000000) >> 24) | (((__uint32_t )(ims->ims_haddr) & 0x00ff0000) >> 8) | (((__uint32_t )(ims->ims_haddr) & 0x0000ff00) << 8) | (((__uint32_t )(ims->ims_haddr) & 0x000000ff) << 24))) : _OSSwapInt32 (ims->ims_haddr)); | |||
3212 | retval = SYSCTL_OUT(req, &src, sizeof(struct in_addr))(req->oldfunc)(req, &src, sizeof(struct in_addr)); | |||
3213 | if (retval != 0) | |||
3214 | break; /* process next inm */ | |||
3215 | } | |||
3216 | next: | |||
3217 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3218 | IN_NEXT_MULTI(step, inm)do { in_multihead_lock_assert(0x03); if (((inm) = (step).i_inm ) != ((void *)0)) (step).i_inm = (((step).i_inm)->inm_link .le_next); } while (0); | |||
3219 | } | |||
3220 | in_multihead_lock_done(); | |||
3221 | ||||
3222 | return (retval); | |||
3223 | } | |||
3224 | ||||
3225 | /* | |||
3226 | * XXX | |||
3227 | * The whole multicast option thing needs to be re-thought. | |||
3228 | * Several of these options are equally applicable to non-multicast | |||
3229 | * transmission, and one (IP_MULTICAST_TTL) totally duplicates a | |||
3230 | * standard option (IP_TTL). | |||
3231 | */ | |||
3232 | /* | |||
3233 | * following RFC1724 section 3.3, 0.0.0.0/8 is interpreted as interface index. | |||
3234 | */ | |||
3235 | static struct ifnet * | |||
3236 | ip_multicast_if(struct in_addr *a, unsigned int *ifindexp) | |||
3237 | { | |||
3238 | unsigned int ifindex; | |||
3239 | struct ifnet *ifp; | |||
3240 | ||||
3241 | if (ifindexp != NULL((void *)0)) | |||
3242 | *ifindexp = 0; | |||
3243 | if (ntohl(a->s_addr)(__builtin_constant_p(a->s_addr) ? ((__uint32_t)((((__uint32_t )(a->s_addr) & 0xff000000) >> 24) | (((__uint32_t )(a->s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(a->s_addr) & 0x0000ff00) << 8) | (((__uint32_t )(a->s_addr) & 0x000000ff) << 24))) : _OSSwapInt32 (a->s_addr)) >> 24 == 0) { | |||
3244 | ifindex = ntohl(a->s_addr)(__builtin_constant_p(a->s_addr) ? ((__uint32_t)((((__uint32_t )(a->s_addr) & 0xff000000) >> 24) | (((__uint32_t )(a->s_addr) & 0x00ff0000) >> 8) | (((__uint32_t )(a->s_addr) & 0x0000ff00) << 8) | (((__uint32_t )(a->s_addr) & 0x000000ff) << 24))) : _OSSwapInt32 (a->s_addr)) & 0xffffff; | |||
3245 | ifnet_head_lock_shared(); | |||
3246 | /* Don't need to check is ifindex is < 0 since it's unsigned */ | |||
3247 | if ((unsigned int)if_index < ifindex) { | |||
3248 | ifnet_head_done(); | |||
3249 | return (NULL((void *)0)); | |||
3250 | } | |||
3251 | ifp = ifindex2ifnet[ifindex]; | |||
3252 | ifnet_head_done(); | |||
3253 | if (ifp != NULL((void *)0) && ifindexp != NULL((void *)0)) | |||
3254 | *ifindexp = ifindex; | |||
3255 | } else { | |||
3256 | INADDR_TO_IFP(*a, ifp){ struct in_ifaddr *ia; lck_rw_lock_shared(in_ifaddr_rwlock); for ((ia) = ((((&in_ifaddrhashtbl[inaddr_hashval((*a).s_addr )])))->tqh_first); (ia); (ia) = (((ia))->ia_hash.tqe_next )) { lck_mtx_lock_spin(&(&ia->ia_ifa)->ifa_lock ); if ((&(((struct in_ifaddr *)(ia))->ia_addr))->sin_addr .s_addr == (*a).s_addr) { lck_mtx_unlock(&(&ia->ia_ifa )->ifa_lock); break; } lck_mtx_unlock(&(&ia->ia_ifa )->ifa_lock); } (ifp) = (ia == ((void *)0)) ? ((void *)0) : ia->ia_ifa.ifa_ifp; lck_rw_done(in_ifaddr_rwlock); }; | |||
3257 | } | |||
3258 | return (ifp); | |||
3259 | } | |||
3260 | ||||
3261 | void | |||
3262 | in_multi_init(void) | |||
3263 | { | |||
3264 | PE_parse_boot_argn("ifa_debug", &inm_debug, sizeof (inm_debug)); | |||
3265 | ||||
3266 | /* Setup lock group and attribute for in_multihead */ | |||
3267 | in_multihead_lock_grp_attr = lck_grp_attr_alloc_init(); | |||
3268 | in_multihead_lock_grp = lck_grp_alloc_init("in_multihead", | |||
3269 | in_multihead_lock_grp_attr); | |||
3270 | in_multihead_lock_attr = lck_attr_alloc_init(); | |||
3271 | lck_rw_init(&in_multihead_lock, in_multihead_lock_grp, | |||
3272 | in_multihead_lock_attr); | |||
3273 | ||||
3274 | lck_mtx_init(&inm_trash_lock, in_multihead_lock_grp, | |||
3275 | in_multihead_lock_attr); | |||
3276 | TAILQ_INIT(&inm_trash_head)do { (((&inm_trash_head))->tqh_first) = ((void *)0); ( &inm_trash_head)->tqh_last = &(((&inm_trash_head ))->tqh_first); ; } while (0); | |||
3277 | ||||
3278 | inm_size = (inm_debug == 0) ? sizeof (struct in_multi) : | |||
3279 | sizeof (struct in_multi_dbg); | |||
3280 | inm_zone = zinit(inm_size, INM_ZONE_MAX64 * inm_size, | |||
3281 | 0, INM_ZONE_NAME"in_multi"); | |||
3282 | if (inm_zone == NULL((void *)0)) { | |||
3283 | panic("%s: failed allocating %s", __func__, INM_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3283", __func__, "in_multi"); | |||
3284 | /* NOTREACHED */ | |||
3285 | } | |||
3286 | zone_change(inm_zone, Z_EXPAND3, TRUE1); | |||
3287 | ||||
3288 | ipms_size = sizeof (struct ip_msource); | |||
3289 | ipms_zone = zinit(ipms_size, IPMS_ZONE_MAX64 * ipms_size, | |||
3290 | 0, IPMS_ZONE_NAME"ip_msource"); | |||
3291 | if (ipms_zone == NULL((void *)0)) { | |||
3292 | panic("%s: failed allocating %s", __func__, IPMS_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3292", __func__, "ip_msource"); | |||
3293 | /* NOTREACHED */ | |||
3294 | } | |||
3295 | zone_change(ipms_zone, Z_EXPAND3, TRUE1); | |||
3296 | ||||
3297 | inms_size = sizeof (struct in_msource); | |||
3298 | inms_zone = zinit(inms_size, INMS_ZONE_MAX64 * inms_size, | |||
3299 | 0, INMS_ZONE_NAME"in_msource"); | |||
3300 | if (inms_zone == NULL((void *)0)) { | |||
3301 | panic("%s: failed allocating %s", __func__, INMS_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3301", __func__, "in_msource"); | |||
3302 | /* NOTREACHED */ | |||
3303 | } | |||
3304 | zone_change(inms_zone, Z_EXPAND3, TRUE1); | |||
3305 | } | |||
3306 | ||||
3307 | static struct in_multi * | |||
3308 | in_multi_alloc(int how) | |||
3309 | { | |||
3310 | struct in_multi *inm; | |||
3311 | ||||
3312 | inm = (how == M_WAITOK0x0000) ? zalloc(inm_zone) : zalloc_noblock(inm_zone); | |||
3313 | if (inm != NULL((void *)0)) { | |||
3314 | bzero(inm, inm_size); | |||
3315 | lck_mtx_init(&inm->inm_lock, in_multihead_lock_grp, | |||
3316 | in_multihead_lock_attr); | |||
3317 | inm->inm_debug |= IFD_ALLOC0x2; | |||
3318 | if (inm_debug != 0) { | |||
3319 | inm->inm_debug |= IFD_DEBUG0x4; | |||
3320 | inm->inm_trace = inm_trace; | |||
3321 | } | |||
3322 | } | |||
3323 | return (inm); | |||
3324 | } | |||
3325 | ||||
3326 | static void | |||
3327 | in_multi_free(struct in_multi *inm) | |||
3328 | { | |||
3329 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
3330 | if (inm->inm_debug & IFD_ATTACHED0x1) { | |||
3331 | panic("%s: attached inm=%p is being freed", __func__, inm)(panic)("\"%s: attached inm=%p is being freed\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3331", __func__, inm); | |||
3332 | /* NOTREACHED */ | |||
3333 | } else if (inm->inm_ifma != NULL((void *)0)) { | |||
3334 | panic("%s: ifma not NULL for inm=%p", __func__, inm)(panic)("\"%s: ifma not NULL for inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3334", __func__, inm); | |||
3335 | /* NOTREACHED */ | |||
3336 | } else if (!(inm->inm_debug & IFD_ALLOC0x2)) { | |||
3337 | panic("%s: inm %p cannot be freed", __func__, inm)(panic)("\"%s: inm %p cannot be freed\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3337", __func__, inm); | |||
3338 | /* NOTREACHED */ | |||
3339 | } else if (inm->inm_refcount != 0) { | |||
3340 | panic("%s: non-zero refcount inm=%p", __func__, inm)(panic)("\"%s: non-zero refcount inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3340", __func__, inm); | |||
3341 | /* NOTREACHED */ | |||
3342 | } else if (inm->inm_reqcnt != 0) { | |||
3343 | panic("%s: non-zero reqcnt inm=%p", __func__, inm)(panic)("\"%s: non-zero reqcnt inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3343", __func__, inm); | |||
3344 | /* NOTREACHED */ | |||
3345 | } | |||
3346 | ||||
3347 | /* Free any pending IGMPv3 state-change records */ | |||
3348 | IF_DRAIN(&inm->inm_scq)do { struct mbuf *_m; for (;;) { do { (_m) = (&inm->inm_scq )->ifq_head; if (_m != ((void *)0)) { if (((&inm->inm_scq )->ifq_head = (_m)->m_hdr.mh_nextpkt) == ((void *)0)) ( &inm->inm_scq)->ifq_tail = ((void *)0); (_m)->m_hdr .mh_nextpkt = ((void *)0); (&inm->inm_scq)->ifq_len --; } } while (0); if (_m == ((void *)0)) break; m_freem(_m); } } while (0); | |||
3349 | ||||
3350 | inm->inm_debug &= ~IFD_ALLOC0x2; | |||
3351 | if ((inm->inm_debug & (IFD_DEBUG0x4 | IFD_TRASHED0x10)) == | |||
3352 | (IFD_DEBUG0x4 | IFD_TRASHED0x10)) { | |||
3353 | lck_mtx_lock(&inm_trash_lock); | |||
3354 | TAILQ_REMOVE(&inm_trash_head, (struct in_multi_dbg *)inm,do { if ((((((struct in_multi_dbg *)inm))->inm_trash_link. tqe_next)) != ((void *)0)) ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next)->inm_trash_link.tqe_prev = ((struct in_multi_dbg *)inm)->inm_trash_link.tqe_prev; else { (& inm_trash_head)->tqh_last = ((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev; ; } *((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev = ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next); ; ; ; } while (0) | |||
3355 | inm_trash_link)do { if ((((((struct in_multi_dbg *)inm))->inm_trash_link. tqe_next)) != ((void *)0)) ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next)->inm_trash_link.tqe_prev = ((struct in_multi_dbg *)inm)->inm_trash_link.tqe_prev; else { (& inm_trash_head)->tqh_last = ((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev; ; } *((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev = ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next); ; ; ; } while (0); | |||
3356 | lck_mtx_unlock(&inm_trash_lock); | |||
3357 | inm->inm_debug &= ~IFD_TRASHED0x10; | |||
3358 | } | |||
3359 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3360 | ||||
3361 | lck_mtx_destroy(&inm->inm_lock, in_multihead_lock_grp); | |||
3362 | zfree(inm_zone, inm); | |||
3363 | } | |||
3364 | ||||
3365 | static void | |||
3366 | in_multi_attach(struct in_multi *inm) | |||
3367 | { | |||
3368 | in_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE0x02); | |||
3369 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
3370 | ||||
3371 | if (inm->inm_debug & IFD_ATTACHED0x1) { | |||
3372 | panic("%s: Attempt to attach an already attached inm=%p",(panic)("\"%s: Attempt to attach an already attached inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3373", __func__, inm) | |||
3373 | __func__, inm)(panic)("\"%s: Attempt to attach an already attached inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3373", __func__, inm); | |||
3374 | /* NOTREACHED */ | |||
3375 | } else if (inm->inm_debug & IFD_TRASHED0x10) { | |||
3376 | panic("%s: Attempt to reattach a detached inm=%p",(panic)("\"%s: Attempt to reattach a detached inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3377", __func__, inm) | |||
3377 | __func__, inm)(panic)("\"%s: Attempt to reattach a detached inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3377", __func__, inm); | |||
3378 | /* NOTREACHED */ | |||
3379 | } | |||
3380 | ||||
3381 | inm->inm_reqcnt++; | |||
3382 | VERIFY(inm->inm_reqcnt == 1)((void)(__builtin_expect(!!((long)((inm->inm_reqcnt == 1)) ), 1L) || assfail("inm->inm_reqcnt == 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" , 3382))); | |||
3383 | INM_ADDREF_LOCKED(inm)inm_addref(inm, 1); | |||
3384 | inm->inm_debug |= IFD_ATTACHED0x1; | |||
3385 | /* | |||
3386 | * Reattach case: If debugging is enabled, take it | |||
3387 | * out of the trash list and clear IFD_TRASHED. | |||
3388 | */ | |||
3389 | if ((inm->inm_debug & (IFD_DEBUG0x4 | IFD_TRASHED0x10)) == | |||
3390 | (IFD_DEBUG0x4 | IFD_TRASHED0x10)) { | |||
3391 | /* Become a regular mutex, just in case */ | |||
3392 | INM_CONVERT_LOCK(inm)do { lck_mtx_assert(&(inm)->inm_lock, 1); lck_mtx_convert_spin (&(inm)->inm_lock); } while (0); | |||
3393 | lck_mtx_lock(&inm_trash_lock); | |||
3394 | TAILQ_REMOVE(&inm_trash_head, (struct in_multi_dbg *)inm,do { if ((((((struct in_multi_dbg *)inm))->inm_trash_link. tqe_next)) != ((void *)0)) ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next)->inm_trash_link.tqe_prev = ((struct in_multi_dbg *)inm)->inm_trash_link.tqe_prev; else { (& inm_trash_head)->tqh_last = ((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev; ; } *((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev = ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next); ; ; ; } while (0) | |||
3395 | inm_trash_link)do { if ((((((struct in_multi_dbg *)inm))->inm_trash_link. tqe_next)) != ((void *)0)) ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next)->inm_trash_link.tqe_prev = ((struct in_multi_dbg *)inm)->inm_trash_link.tqe_prev; else { (& inm_trash_head)->tqh_last = ((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev; ; } *((struct in_multi_dbg *)inm)-> inm_trash_link.tqe_prev = ((((struct in_multi_dbg *)inm))-> inm_trash_link.tqe_next); ; ; ; } while (0); | |||
3396 | lck_mtx_unlock(&inm_trash_lock); | |||
3397 | inm->inm_debug &= ~IFD_TRASHED0x10; | |||
3398 | } | |||
3399 | ||||
3400 | LIST_INSERT_HEAD(&in_multihead, inm, inm_link)do { ; if (((((inm))->inm_link.le_next) = (((&in_multihead ))->lh_first)) != ((void *)0)) (((&in_multihead))-> lh_first)->inm_link.le_prev = &(((inm))->inm_link.le_next ); (((&in_multihead))->lh_first) = (inm); (inm)->inm_link .le_prev = &(((&in_multihead))->lh_first); } while (0); | |||
3401 | } | |||
3402 | ||||
3403 | int | |||
3404 | in_multi_detach(struct in_multi *inm) | |||
3405 | { | |||
3406 | in_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE0x02); | |||
3407 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
3408 | ||||
3409 | if (inm->inm_reqcnt == 0) { | |||
3410 | panic("%s: inm=%p negative reqcnt", __func__, inm)(panic)("\"%s: inm=%p negative reqcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3410", __func__, inm); | |||
3411 | /* NOTREACHED */ | |||
3412 | } | |||
3413 | ||||
3414 | --inm->inm_reqcnt; | |||
3415 | if (inm->inm_reqcnt > 0) | |||
3416 | return (0); | |||
3417 | ||||
3418 | if (!(inm->inm_debug & IFD_ATTACHED0x1)) { | |||
3419 | panic("%s: Attempt to detach an unattached record inm=%p",(panic)("\"%s: Attempt to detach an unattached record inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3420", __func__, inm) | |||
3420 | __func__, inm)(panic)("\"%s: Attempt to detach an unattached record inm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3420", __func__, inm); | |||
3421 | /* NOTREACHED */ | |||
3422 | } else if (inm->inm_debug & IFD_TRASHED0x10) { | |||
3423 | panic("%s: inm %p is already in trash list", __func__, inm)(panic)("\"%s: inm %p is already in trash list\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3423", __func__, inm); | |||
3424 | /* NOTREACHED */ | |||
3425 | } | |||
3426 | ||||
3427 | /* | |||
3428 | * NOTE: Caller calls IFMA_REMREF | |||
3429 | */ | |||
3430 | inm->inm_debug &= ~IFD_ATTACHED0x1; | |||
3431 | LIST_REMOVE(inm, inm_link)do { ; ; if ((((inm))->inm_link.le_next) != ((void *)0)) ( ((inm))->inm_link.le_next)->inm_link.le_prev = (inm)-> inm_link.le_prev; *(inm)->inm_link.le_prev = (((inm))-> inm_link.le_next); ; ; } while (0); | |||
3432 | ||||
3433 | if (inm->inm_debug & IFD_DEBUG0x4) { | |||
3434 | /* Become a regular mutex, just in case */ | |||
3435 | INM_CONVERT_LOCK(inm)do { lck_mtx_assert(&(inm)->inm_lock, 1); lck_mtx_convert_spin (&(inm)->inm_lock); } while (0); | |||
3436 | lck_mtx_lock(&inm_trash_lock); | |||
3437 | TAILQ_INSERT_TAIL(&inm_trash_head,do { ((((struct in_multi_dbg *)inm))->inm_trash_link.tqe_next ) = ((void *)0); ((struct in_multi_dbg *)inm)->inm_trash_link .tqe_prev = (&inm_trash_head)->tqh_last; *(&inm_trash_head )->tqh_last = ((struct in_multi_dbg *)inm); (&inm_trash_head )->tqh_last = &((((struct in_multi_dbg *)inm))->inm_trash_link .tqe_next); ; ; } while (0) | |||
3438 | (struct in_multi_dbg *)inm, inm_trash_link)do { ((((struct in_multi_dbg *)inm))->inm_trash_link.tqe_next ) = ((void *)0); ((struct in_multi_dbg *)inm)->inm_trash_link .tqe_prev = (&inm_trash_head)->tqh_last; *(&inm_trash_head )->tqh_last = ((struct in_multi_dbg *)inm); (&inm_trash_head )->tqh_last = &((((struct in_multi_dbg *)inm))->inm_trash_link .tqe_next); ; ; } while (0); | |||
3439 | lck_mtx_unlock(&inm_trash_lock); | |||
3440 | inm->inm_debug |= IFD_TRASHED0x10; | |||
3441 | } | |||
3442 | ||||
3443 | return (1); | |||
3444 | } | |||
3445 | ||||
3446 | void | |||
3447 | inm_addref(struct in_multi *inm, int locked) | |||
3448 | { | |||
3449 | if (!locked) | |||
3450 | INM_LOCK_SPIN(inm)lck_mtx_lock_spin(&(inm)->inm_lock); | |||
3451 | else | |||
3452 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
3453 | ||||
3454 | if (++inm->inm_refcount == 0) { | |||
3455 | panic("%s: inm=%p wraparound refcnt", __func__, inm)(panic)("\"%s: inm=%p wraparound refcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3455", __func__, inm); | |||
3456 | /* NOTREACHED */ | |||
3457 | } else if (inm->inm_trace != NULL((void *)0)) { | |||
3458 | (*inm->inm_trace)(inm, TRUE1); | |||
3459 | } | |||
3460 | if (!locked) | |||
3461 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3462 | } | |||
3463 | ||||
3464 | void | |||
3465 | inm_remref(struct in_multi *inm, int locked) | |||
3466 | { | |||
3467 | struct ifmultiaddr *ifma; | |||
3468 | struct igmp_ifinfo *igi; | |||
3469 | ||||
3470 | if (!locked) | |||
3471 | INM_LOCK_SPIN(inm)lck_mtx_lock_spin(&(inm)->inm_lock); | |||
3472 | else | |||
3473 | INM_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->inm_lock, 1); | |||
3474 | ||||
3475 | if (inm->inm_refcount == 0 || (inm->inm_refcount == 1 && locked)) { | |||
3476 | panic("%s: inm=%p negative/missing refcnt", __func__, inm)(panic)("\"%s: inm=%p negative/missing refcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3476", __func__, inm); | |||
3477 | /* NOTREACHED */ | |||
3478 | } else if (inm->inm_trace != NULL((void *)0)) { | |||
3479 | (*inm->inm_trace)(inm, FALSE0); | |||
3480 | } | |||
3481 | ||||
3482 | --inm->inm_refcount; | |||
3483 | if (inm->inm_refcount > 0) { | |||
3484 | if (!locked) | |||
3485 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3486 | return; | |||
3487 | } | |||
3488 | ||||
3489 | /* | |||
3490 | * Synchronization with in_getmulti(). In the event the inm has been | |||
3491 | * detached, the underlying ifma would still be in the if_multiaddrs | |||
3492 | * list, and thus can be looked up via if_addmulti(). At that point, | |||
3493 | * the only way to find this inm is via ifma_protospec. To avoid | |||
3494 | * race conditions between the last inm_remref() of that inm and its | |||
3495 | * use via ifma_protospec, in_multihead lock is used for serialization. | |||
3496 | * In order to avoid violating the lock order, we must drop inm_lock | |||
3497 | * before acquiring in_multihead lock. To prevent the inm from being | |||
3498 | * freed prematurely, we hold an extra reference. | |||
3499 | */ | |||
3500 | ++inm->inm_refcount; | |||
3501 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3502 | in_multihead_lock_shared(); | |||
3503 | INM_LOCK_SPIN(inm)lck_mtx_lock_spin(&(inm)->inm_lock); | |||
3504 | --inm->inm_refcount; | |||
3505 | if (inm->inm_refcount > 0) { | |||
3506 | /* We've lost the race, so abort since inm is still in use */ | |||
3507 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3508 | in_multihead_lock_done(); | |||
3509 | /* If it was locked, return it as such */ | |||
3510 | if (locked) | |||
3511 | INM_LOCK(inm)lck_mtx_lock(&(inm)->inm_lock); | |||
3512 | return; | |||
3513 | } | |||
3514 | inm_purge(inm); | |||
3515 | ifma = inm->inm_ifma; | |||
3516 | inm->inm_ifma = NULL((void *)0); | |||
3517 | inm->inm_ifp = NULL((void *)0); | |||
3518 | igi = inm->inm_igi; | |||
3519 | inm->inm_igi = NULL((void *)0); | |||
3520 | INM_UNLOCK(inm)lck_mtx_unlock(&(inm)->inm_lock); | |||
3521 | IFMA_LOCK_SPIN(ifma)lck_mtx_lock_spin(&(ifma)->ifma_lock); | |||
3522 | ifma->ifma_protospec = NULL((void *)0); | |||
3523 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
3524 | in_multihead_lock_done(); | |||
3525 | ||||
3526 | in_multi_free(inm); | |||
3527 | if_delmulti_ifma(ifma); | |||
3528 | /* Release reference held to the underlying ifmultiaddr */ | |||
3529 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
3530 | ||||
3531 | if (igi != NULL((void *)0)) | |||
3532 | IGI_REMREF(igi)igi_remref(igi); | |||
3533 | } | |||
3534 | ||||
3535 | static void | |||
3536 | inm_trace(struct in_multi *inm, int refhold) | |||
3537 | { | |||
3538 | struct in_multi_dbg *inm_dbg = (struct in_multi_dbg *)inm; | |||
3539 | ctrace_t *tr; | |||
3540 | u_int32_t idx; | |||
3541 | u_int16_t *cnt; | |||
3542 | ||||
3543 | if (!(inm->inm_debug & IFD_DEBUG0x4)) { | |||
3544 | panic("%s: inm %p has no debug structure", __func__, inm)(panic)("\"%s: inm %p has no debug structure\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet/in_mcast.c" ":" "3544", __func__, inm); | |||
3545 | /* NOTREACHED */ | |||
3546 | } | |||
3547 | if (refhold) { | |||
3548 | cnt = &inm_dbg->inm_refhold_cnt; | |||
3549 | tr = inm_dbg->inm_refhold; | |||
3550 | } else { | |||
3551 | cnt = &inm_dbg->inm_refrele_cnt; | |||
3552 | tr = inm_dbg->inm_refrele; | |||
3553 | } | |||
3554 | ||||
3555 | idx = atomic_add_16_ov(cnt, 1)((u_int16_t) OSAddAtomic16(1, (volatile SInt16 *)cnt)) % INM_TRACE_HIST_SIZE32; | |||
3556 | ctrace_record(&tr[idx]); | |||
3557 | } | |||
3558 | ||||
3559 | void | |||
3560 | in_multihead_lock_exclusive(void) | |||
3561 | { | |||
3562 | lck_rw_lock_exclusive(&in_multihead_lock); | |||
3563 | } | |||
3564 | ||||
3565 | void | |||
3566 | in_multihead_lock_shared(void) | |||
3567 | { | |||
3568 | lck_rw_lock_shared(&in_multihead_lock); | |||
3569 | } | |||
3570 | ||||
3571 | void | |||
3572 | in_multihead_lock_assert(int what) | |||
3573 | { | |||
3574 | lck_rw_assert(&in_multihead_lock, what); | |||
3575 | } | |||
3576 | ||||
3577 | void | |||
3578 | in_multihead_lock_done(void) | |||
3579 | { | |||
3580 | lck_rw_done(&in_multihead_lock); | |||
3581 | } | |||
3582 | ||||
3583 | static struct ip_msource * | |||
3584 | ipms_alloc(int how) | |||
3585 | { | |||
3586 | struct ip_msource *ims; | |||
3587 | ||||
3588 | ims = (how == M_WAITOK0x0000) ? zalloc(ipms_zone) : zalloc_noblock(ipms_zone); | |||
3589 | if (ims != NULL((void *)0)) | |||
3590 | bzero(ims, ipms_size); | |||
3591 | ||||
3592 | return (ims); | |||
3593 | } | |||
3594 | ||||
3595 | static void | |||
3596 | ipms_free(struct ip_msource *ims) | |||
3597 | { | |||
3598 | zfree(ipms_zone, ims); | |||
3599 | } | |||
3600 | ||||
3601 | static struct in_msource * | |||
3602 | inms_alloc(int how) | |||
3603 | { | |||
3604 | struct in_msource *inms; | |||
3605 | ||||
3606 | inms = (how == M_WAITOK0x0000) ? zalloc(inms_zone) : | |||
3607 | zalloc_noblock(inms_zone); | |||
3608 | if (inms != NULL((void *)0)) | |||
3609 | bzero(inms, inms_size); | |||
3610 | ||||
3611 | return (inms); | |||
3612 | } | |||
3613 | ||||
3614 | static void | |||
3615 | inms_free(struct in_msource *inms) | |||
3616 | { | |||
3617 | zfree(inms_zone, inms); | |||
3618 | } | |||
3619 | ||||
3620 | #ifdef IGMP_DEBUG1 | |||
3621 | ||||
3622 | static const char *inm_modestrs[] = { "un\n", "in", "ex" }; | |||
3623 | ||||
3624 | static const char * | |||
3625 | inm_mode_str(const int mode) | |||
3626 | { | |||
3627 | if (mode >= MCAST_UNDEFINED0 && mode <= MCAST_EXCLUDE2) | |||
3628 | return (inm_modestrs[mode]); | |||
3629 | return ("??"); | |||
3630 | } | |||
3631 | ||||
3632 | static const char *inm_statestrs[] = { | |||
3633 | "not-member\n", | |||
3634 | "silent\n", | |||
3635 | "reporting\n", | |||
3636 | "idle\n", | |||
3637 | "lazy\n", | |||
3638 | "sleeping\n", | |||
3639 | "awakening\n", | |||
3640 | "query-pending\n", | |||
3641 | "sg-query-pending\n", | |||
3642 | "leaving" | |||
3643 | }; | |||
3644 | ||||
3645 | static const char * | |||
3646 | inm_state_str(const int state) | |||
3647 | { | |||
3648 | if (state >= IGMP_NOT_MEMBER0 && state <= IGMP_LEAVING_MEMBER9) | |||
3649 | return (inm_statestrs[state]); | |||
3650 | return ("??"); | |||
3651 | } | |||
3652 | ||||
3653 | /* | |||
3654 | * Dump an in_multi structure to the console. | |||
3655 | */ | |||
3656 | void | |||
3657 | inm_print(const struct in_multi *inm) | |||
3658 | { | |||
3659 | int t; | |||
3660 | char buf[MAX_IPv4_STR_LEN16]; | |||
3661 | ||||
3662 | INM_LOCK_ASSERT_HELD(__DECONST(struct in_multi *, inm))lck_mtx_assert(&((struct in_multi *) (long)(inm))->inm_lock , 1); | |||
3663 | ||||
3664 | if (igmp_debug == 0) | |||
3665 | return; | |||
3666 | ||||
3667 | inet_ntop(AF_INET2, &inm->inm_addr, buf, sizeof(buf)); | |||
3668 | printf("%s: --- begin inm 0x%llx ---\n", __func__, | |||
3669 | (uint64_t)VM_KERNEL_ADDRPERM(inm)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t) (inm) + vm_kernel_addrperm)); | |||
3670 | printf("addr %s ifp 0x%llx(%s) ifma 0x%llx\n", | |||
3671 | buf, | |||
3672 | (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_ifp)(((vm_offset_t)(inm->inm_ifp) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm->inm_ifp) + vm_kernel_addrperm), | |||
3673 | if_name(inm->inm_ifp)inm->inm_ifp->if_xname, | |||
3674 | (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_ifma)(((vm_offset_t)(inm->inm_ifma) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm->inm_ifma) + vm_kernel_addrperm)); | |||
3675 | printf("timer %u state %s refcount %u scq.len %u\n", | |||
3676 | inm->inm_timer, | |||
3677 | inm_state_str(inm->inm_state), | |||
3678 | inm->inm_refcount, | |||
3679 | inm->inm_scq.ifq_len); | |||
3680 | printf("igi 0x%llx nsrc %lu sctimer %u scrv %u\n", | |||
3681 | (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_igi)(((vm_offset_t)(inm->inm_igi) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm->inm_igi) + vm_kernel_addrperm), | |||
3682 | inm->inm_nsrc, | |||
3683 | inm->inm_sctimer, | |||
3684 | inm->inm_scrv); | |||
3685 | for (t = 0; t < 2; t++) { | |||
3686 | printf("t%d: fmode %s asm %u ex %u in %u rec %u\n", t, | |||
3687 | inm_mode_str(inm->inm_st[t].iss_fmode), | |||
3688 | inm->inm_st[t].iss_asm, | |||
3689 | inm->inm_st[t].iss_ex, | |||
3690 | inm->inm_st[t].iss_in, | |||
3691 | inm->inm_st[t].iss_rec); | |||
3692 | } | |||
3693 | printf("%s: --- end inm 0x%llx ---\n", __func__, | |||
3694 | (uint64_t)VM_KERNEL_ADDRPERM(inm)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t) (inm) + vm_kernel_addrperm)); | |||
3695 | } | |||
3696 | ||||
3697 | #else | |||
3698 | ||||
3699 | void | |||
3700 | inm_print(__unused__attribute__((unused)) const struct in_multi *inm) | |||
3701 | { | |||
3702 | ||||
3703 | } | |||
3704 | ||||
3705 | #endif |