File: | bsd/netinet6/in6_mcast.c |
Warning: | line 1779, column 11 Copies out a struct with untouched element(s): __msfr_align, msfr_srcs |
1 | /* | |||
2 | * Copyright (c) 2010-2016 Apple Inc. All rights reserved. | |||
3 | * | |||
4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | |||
5 | * | |||
6 | * This file contains Original Code and/or Modifications of Original Code | |||
7 | * as defined in and that are subject to the Apple Public Source License | |||
8 | * Version 2.0 (the 'License'). You may not use this file except in | |||
9 | * compliance with the License. The rights granted to you under the License | |||
10 | * may not be used to create, or enable the creation or redistribution of, | |||
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |||
12 | * circumvent, violate, or enable the circumvention or violation of, any | |||
13 | * terms of an Apple operating system software license agreement. | |||
14 | * | |||
15 | * Please obtain a copy of the License at | |||
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |||
17 | * | |||
18 | * The Original Code and all software distributed under the License are | |||
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |||
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |||
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |||
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |||
23 | * Please see the License for the specific language governing rights and | |||
24 | * limitations under the License. | |||
25 | * | |||
26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | |||
27 | */ | |||
28 | /* | |||
29 | * Copyright (c) 2009 Bruce Simpson. | |||
30 | * All rights reserved. | |||
31 | * | |||
32 | * Redistribution and use in source and binary forms, with or without | |||
33 | * modification, are permitted provided that the following conditions | |||
34 | * are met: | |||
35 | * 1. Redistributions of source code must retain the above copyright | |||
36 | * notice, this list of conditions and the following disclaimer. | |||
37 | * 2. Redistributions in binary form must reproduce the above copyright | |||
38 | * notice, this list of conditions and the following disclaimer in the | |||
39 | * documentation and/or other materials provided with the distribution. | |||
40 | * 3. The name of the author may not be used to endorse or promote | |||
41 | * products derived from this software without specific prior written | |||
42 | * permission. | |||
43 | * | |||
44 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND | |||
45 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |||
46 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |||
47 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |||
48 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |||
49 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |||
50 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |||
51 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |||
52 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |||
53 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |||
54 | * SUCH DAMAGE. | |||
55 | */ | |||
56 | ||||
57 | /* | |||
58 | * IPv6 multicast socket, group, and socket option processing module. | |||
59 | * Normative references: RFC 2292, RFC 3492, RFC 3542, RFC 3678, RFC 3810. | |||
60 | */ | |||
61 | ||||
62 | #include <sys/cdefs.h> | |||
63 | ||||
64 | #include <sys/param.h> | |||
65 | #include <sys/systm.h> | |||
66 | #include <sys/kernel.h> | |||
67 | #include <sys/malloc.h> | |||
68 | #include <sys/mbuf.h> | |||
69 | #include <sys/protosw.h> | |||
70 | #include <sys/socket.h> | |||
71 | #include <sys/socketvar.h> | |||
72 | #include <sys/protosw.h> | |||
73 | #include <sys/sysctl.h> | |||
74 | #include <sys/tree.h> | |||
75 | #include <sys/mcache.h> | |||
76 | ||||
77 | #include <kern/zalloc.h> | |||
78 | ||||
79 | #include <pexpert/pexpert.h> | |||
80 | ||||
81 | #include <net/if.h> | |||
82 | #include <net/if_dl.h> | |||
83 | #include <net/route.h> | |||
84 | ||||
85 | #include <netinet/in.h> | |||
86 | #include <netinet/in_var.h> | |||
87 | #include <netinet6/in6_var.h> | |||
88 | #include <netinet/ip6.h> | |||
89 | #include <netinet/icmp6.h> | |||
90 | #include <netinet6/ip6_var.h> | |||
91 | #include <netinet/in_pcb.h> | |||
92 | #include <netinet/tcp.h> | |||
93 | #include <netinet/tcp_seq.h> | |||
94 | #include <netinet/tcp_var.h> | |||
95 | #include <netinet6/nd6.h> | |||
96 | #include <netinet6/mld6_var.h> | |||
97 | #include <netinet6/scope6_var.h> | |||
98 | ||||
99 | #ifndef __SOCKUNION_DECLARED | |||
100 | union sockunion { | |||
101 | struct sockaddr_storage ss; | |||
102 | struct sockaddr sa; | |||
103 | struct sockaddr_dl sdl; | |||
104 | struct sockaddr_in6 sin6; | |||
105 | }; | |||
106 | typedef union sockunion sockunion_t; | |||
107 | #define __SOCKUNION_DECLARED | |||
108 | #endif /* __SOCKUNION_DECLARED */ | |||
109 | ||||
110 | static void im6f_commit(struct in6_mfilter *); | |||
111 | static int im6f_get_source(struct in6_mfilter *imf, | |||
112 | const struct sockaddr_in6 *psin, | |||
113 | struct in6_msource **); | |||
114 | static struct in6_msource * | |||
115 | im6f_graft(struct in6_mfilter *, const uint8_t, | |||
116 | const struct sockaddr_in6 *); | |||
117 | static int im6f_prune(struct in6_mfilter *, const struct sockaddr_in6 *); | |||
118 | static void im6f_rollback(struct in6_mfilter *); | |||
119 | static void im6f_reap(struct in6_mfilter *); | |||
120 | static int im6o_grow(struct ip6_moptions *, size_t); | |||
121 | static size_t im6o_match_group(const struct ip6_moptions *, | |||
122 | const struct ifnet *, const struct sockaddr *); | |||
123 | static struct in6_msource * | |||
124 | im6o_match_source(const struct ip6_moptions *, const size_t, | |||
125 | const struct sockaddr *); | |||
126 | static void im6s_merge(struct ip6_msource *ims, | |||
127 | const struct in6_msource *lims, const int rollback); | |||
128 | static int in6_mc_get(struct ifnet *, const struct in6_addr *, | |||
129 | struct in6_multi **); | |||
130 | static int in6m_get_source(struct in6_multi *inm, | |||
131 | const struct in6_addr *addr, const int noalloc, | |||
132 | struct ip6_msource **pims); | |||
133 | static int in6m_is_ifp_detached(const struct in6_multi *); | |||
134 | static int in6m_merge(struct in6_multi *, /*const*/ struct in6_mfilter *); | |||
135 | static void in6m_reap(struct in6_multi *); | |||
136 | static struct ip6_moptions * | |||
137 | in6p_findmoptions(struct inpcb *); | |||
138 | static int in6p_get_source_filters(struct inpcb *, struct sockopt *); | |||
139 | static int in6p_lookup_v4addr(struct ipv6_mreq *, struct ip_mreq *); | |||
140 | static int in6p_join_group(struct inpcb *, struct sockopt *); | |||
141 | static int in6p_leave_group(struct inpcb *, struct sockopt *); | |||
142 | static struct ifnet * | |||
143 | in6p_lookup_mcast_ifp(const struct inpcb *, | |||
144 | const struct sockaddr_in6 *); | |||
145 | static int in6p_block_unblock_source(struct inpcb *, struct sockopt *); | |||
146 | static int in6p_set_multicast_if(struct inpcb *, struct sockopt *); | |||
147 | static int in6p_set_source_filters(struct inpcb *, struct sockopt *); | |||
148 | static int sysctl_ip6_mcast_filters SYSCTL_HANDLER_ARGS(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req); | |||
149 | static __inline__ int ip6_msource_cmp(const struct ip6_msource *, | |||
150 | const struct ip6_msource *); | |||
151 | ||||
152 | SYSCTL_DECL(_net_inet6_ip6)extern struct sysctl_oid_list sysctl__net_inet6_ip6_children; /* XXX Not in any common header. */ | |||
153 | ||||
154 | SYSCTL_NODE(_net_inet6_ip6, OID_AUTO, mcast, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "IPv6 multicast")struct sysctl_oid_list sysctl__net_inet6_ip6_mcast_children; struct sysctl_oid sysctl__net_inet6_ip6_mcast = { &sysctl__net_inet6_ip6_children , { 0 }, (-1), (int)(1|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), (void*)&sysctl__net_inet6_ip6_mcast_children, (int)(0) , "mcast", 0, "N", "IPv6 multicast", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast;; | |||
155 | ||||
156 | static unsigned long in6_mcast_maxgrpsrc = IPV6_MAX_GROUP_SRC_FILTER512; | |||
157 | SYSCTL_LONG(_net_inet6_ip6_mcast, OID_AUTO, maxgrpsrc,struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxgrpsrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxgrpsrc , (int)(0), "maxgrpsrc", sysctl_handle_long, "L", "Max source filters per group" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxgrpsrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxgrpsrc; typedef char _sysctl__net_inet6_ip6_mcast_maxgrpsrc_size_check [(__builtin_constant_p(&in6_mcast_maxgrpsrc) || sizeof(*( &in6_mcast_maxgrpsrc)) == sizeof(long)) ? 0 : -1]; | |||
158 | CTLFLAG_RW | CTLFLAG_LOCKED, &in6_mcast_maxgrpsrc,struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxgrpsrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxgrpsrc , (int)(0), "maxgrpsrc", sysctl_handle_long, "L", "Max source filters per group" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxgrpsrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxgrpsrc; typedef char _sysctl__net_inet6_ip6_mcast_maxgrpsrc_size_check [(__builtin_constant_p(&in6_mcast_maxgrpsrc) || sizeof(*( &in6_mcast_maxgrpsrc)) == sizeof(long)) ? 0 : -1]; | |||
159 | "Max source filters per group")struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxgrpsrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxgrpsrc , (int)(0), "maxgrpsrc", sysctl_handle_long, "L", "Max source filters per group" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxgrpsrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxgrpsrc; typedef char _sysctl__net_inet6_ip6_mcast_maxgrpsrc_size_check [(__builtin_constant_p(&in6_mcast_maxgrpsrc) || sizeof(*( &in6_mcast_maxgrpsrc)) == sizeof(long)) ? 0 : -1];; | |||
160 | ||||
161 | static unsigned long in6_mcast_maxsocksrc = IPV6_MAX_SOCK_SRC_FILTER128; | |||
162 | SYSCTL_LONG(_net_inet6_ip6_mcast, OID_AUTO, maxsocksrc,struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxsocksrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxsocksrc; typedef char _sysctl__net_inet6_ip6_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in6_mcast_maxsocksrc) || sizeof(* (&in6_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1]; | |||
163 | CTLFLAG_RW | CTLFLAG_LOCKED, &in6_mcast_maxsocksrc,struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxsocksrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxsocksrc; typedef char _sysctl__net_inet6_ip6_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in6_mcast_maxsocksrc) || sizeof(* (&in6_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1]; | |||
164 | "Max source filters per socket")struct sysctl_oid sysctl__net_inet6_ip6_mcast_maxsocksrc = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(2|(0x80000000 |0x40000000) | 0x00800000|0x00400000), &in6_mcast_maxsocksrc , (int)(0), "maxsocksrc", sysctl_handle_long, "L", "Max source filters per socket" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_maxsocksrc __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_maxsocksrc; typedef char _sysctl__net_inet6_ip6_mcast_maxsocksrc_size_check [(__builtin_constant_p(&in6_mcast_maxsocksrc) || sizeof(* (&in6_mcast_maxsocksrc)) == sizeof(long)) ? 0 : -1];; | |||
165 | ||||
166 | int in6_mcast_loop = IPV6_DEFAULT_MULTICAST_LOOP1; | |||
167 | SYSCTL_INT(_net_inet6_ip6_mcast, OID_AUTO, loop, CTLFLAG_RW | CTLFLAG_LOCKED,struct sysctl_oid sysctl__net_inet6_ip6_mcast_loop = { &sysctl__net_inet6_ip6_mcast_children , { 0 }, (-1), (int)(2|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), &in6_mcast_loop, (int)(0), "loop", sysctl_handle_int, "I" , "Loopback multicast datagrams by default", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_loop __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_loop ; typedef char _sysctl__net_inet6_ip6_mcast_loop_size_check[( __builtin_constant_p(&in6_mcast_loop) || sizeof(*(&in6_mcast_loop )) == sizeof(int)) ? 0 : -1]; | |||
168 | &in6_mcast_loop, 0, "Loopback multicast datagrams by default")struct sysctl_oid sysctl__net_inet6_ip6_mcast_loop = { &sysctl__net_inet6_ip6_mcast_children , { 0 }, (-1), (int)(2|(0x80000000|0x40000000) | 0x00800000|0x00400000 ), &in6_mcast_loop, (int)(0), "loop", sysctl_handle_int, "I" , "Loopback multicast datagrams by default", 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_loop __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_loop ; typedef char _sysctl__net_inet6_ip6_mcast_loop_size_check[( __builtin_constant_p(&in6_mcast_loop) || sizeof(*(&in6_mcast_loop )) == sizeof(int)) ? 0 : -1];; | |||
169 | ||||
170 | SYSCTL_NODE(_net_inet6_ip6_mcast, OID_AUTO, filters,struct sysctl_oid_list sysctl__net_inet6_ip6_mcast_filters_children ; struct sysctl_oid sysctl__net_inet6_ip6_mcast_filters = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet6_ip6_mcast_filters_children , (int)(0), "filters", sysctl_ip6_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_filters; | |||
171 | CTLFLAG_RD | CTLFLAG_LOCKED, sysctl_ip6_mcast_filters,struct sysctl_oid_list sysctl__net_inet6_ip6_mcast_filters_children ; struct sysctl_oid sysctl__net_inet6_ip6_mcast_filters = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet6_ip6_mcast_filters_children , (int)(0), "filters", sysctl_ip6_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_filters; | |||
172 | "Per-interface stack-wide source filters")struct sysctl_oid_list sysctl__net_inet6_ip6_mcast_filters_children ; struct sysctl_oid sysctl__net_inet6_ip6_mcast_filters = { & sysctl__net_inet6_ip6_mcast_children, { 0 }, (-1), (int)(1|0x80000000 | 0x00800000|0x00400000), (void*)&sysctl__net_inet6_ip6_mcast_filters_children , (int)(0), "filters", sysctl_ip6_mcast_filters, "N", "Per-interface stack-wide source filters" , 1, 0 }; void const * __set___sysctl_set_sym_sysctl__net_inet6_ip6_mcast_filters __attribute__ ((section("__DATA,__sysctl_set"),used)) = (void *)&sysctl__net_inet6_ip6_mcast_filters;; | |||
173 | ||||
174 | RB_GENERATE_PREV(ip6_msource_tree, ip6_msource, im6s_link, ip6_msource_cmp)struct ip6_msource *ip6_msource_tree_RB_GETPARENT(struct ip6_msource *elm) { struct ip6_msource *parent = (elm)->im6s_link.rbe_parent ; if( parent != ((void *)0)) { parent = (struct ip6_msource*) ((uintptr_t)parent & ~(uintptr_t)0x1); return( (struct ip6_msource *) ( (parent == (struct ip6_msource*) ((void *)0)) ? ((void * )0): parent)); } return((struct ip6_msource*)((void *)0)); } int ip6_msource_tree_RB_GETCOLOR(struct ip6_msource *elm) { int color = 0; color = (int)((uintptr_t)(elm)->im6s_link.rbe_parent & (uintptr_t)0x1); return(color); } void ip6_msource_tree_RB_SETCOLOR (struct ip6_msource *elm,int color) { struct ip6_msource *parent = ip6_msource_tree_RB_GETPARENT(elm); if(parent == (struct ip6_msource *)((void *)0)) parent = (struct ip6_msource*) ((void *)0); (elm )->im6s_link.rbe_parent = (struct ip6_msource*)((uintptr_t )parent | (unsigned int)color);} struct ip6_msource *ip6_msource_tree_RB_SETPARENT (struct ip6_msource *elm, struct ip6_msource *parent) { int color = ip6_msource_tree_RB_GETCOLOR(elm); (elm)->im6s_link.rbe_parent = parent; if(color) ip6_msource_tree_RB_SETCOLOR(elm, color) ; return(ip6_msource_tree_RB_GETPARENT(elm)); } void ip6_msource_tree_RB_INSERT_COLOR (struct ip6_msource_tree *head, struct ip6_msource *elm) { struct ip6_msource *parent, *gparent, *tmp; while ((parent = ip6_msource_tree_RB_GETPARENT (elm)) != ((void *)0) && ip6_msource_tree_RB_GETCOLOR (parent) == 1) { gparent = ip6_msource_tree_RB_GETPARENT(parent ); if (parent == (gparent)->im6s_link.rbe_left) { tmp = (gparent )->im6s_link.rbe_right; if (tmp && ip6_msource_tree_RB_GETCOLOR (tmp) == 1) { ip6_msource_tree_RB_SETCOLOR(tmp, 0); do { ip6_msource_tree_RB_SETCOLOR (parent, 0); ip6_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); elm = gparent; continue; } if ((parent)->im6s_link. rbe_right == elm) { do { (tmp) = (parent)->im6s_link.rbe_right ; if (((parent)->im6s_link.rbe_right = (tmp)->im6s_link .rbe_left) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT((tmp )->im6s_link.rbe_left,(parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT (tmp, ip6_msource_tree_RB_GETPARENT(parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT(parent))-> im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT(parent))-> im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_left = (parent); ip6_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); tmp = parent; parent = elm; elm = tmp; } do { ip6_msource_tree_RB_SETCOLOR (parent, 0); ip6_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); do { (tmp) = (gparent)->im6s_link.rbe_left; if (((gparent )->im6s_link.rbe_left = (tmp)->im6s_link.rbe_right) != ( (void *)0)) { ip6_msource_tree_RB_SETPARENT((tmp)->im6s_link .rbe_right, (gparent)); } (void)(gparent); if (ip6_msource_tree_RB_SETPARENT (tmp, ip6_msource_tree_RB_GETPARENT(gparent)) != ((void *)0)) { if ((gparent) == (ip6_msource_tree_RB_GETPARENT(gparent))-> im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT(gparent))-> im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (gparent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_right = (gparent); ip6_msource_tree_RB_SETPARENT (gparent, tmp); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); } else { tmp = (gparent)->im6s_link.rbe_left; if (tmp && ip6_msource_tree_RB_GETCOLOR(tmp) == 1) { ip6_msource_tree_RB_SETCOLOR (tmp, 0); do { ip6_msource_tree_RB_SETCOLOR(parent, 0); ip6_msource_tree_RB_SETCOLOR (gparent, 1); } while ( 0); elm = gparent; continue; } if ((parent )->im6s_link.rbe_left == elm) { do { (tmp) = (parent)-> im6s_link.rbe_left; if (((parent)->im6s_link.rbe_left = (tmp )->im6s_link.rbe_right) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((tmp)->im6s_link.rbe_right, (parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT(tmp, ip6_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_right = (parent); ip6_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); tmp = parent; parent = elm; elm = tmp; } do { ip6_msource_tree_RB_SETCOLOR (parent, 0); ip6_msource_tree_RB_SETCOLOR(gparent, 1); } while ( 0); do { (tmp) = (gparent)->im6s_link.rbe_right; if ((( gparent)->im6s_link.rbe_right = (tmp)->im6s_link.rbe_left ) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT((tmp)->im6s_link .rbe_left,(gparent)); } (void)(gparent); if (ip6_msource_tree_RB_SETPARENT (tmp, ip6_msource_tree_RB_GETPARENT(gparent)) != ((void *)0)) { if ((gparent) == (ip6_msource_tree_RB_GETPARENT(gparent))-> im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT(gparent))-> im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (gparent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_left = (gparent); ip6_msource_tree_RB_SETPARENT (gparent, (tmp)); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); } } ip6_msource_tree_RB_SETCOLOR(head->rbh_root, 0); } void ip6_msource_tree_RB_REMOVE_COLOR(struct ip6_msource_tree *head, struct ip6_msource *parent, struct ip6_msource *elm) { struct ip6_msource *tmp; while ((elm == ((void *)0) || ip6_msource_tree_RB_GETCOLOR (elm) == 0) && elm != (head)->rbh_root) { if ((parent )->im6s_link.rbe_left == elm) { tmp = (parent)->im6s_link .rbe_right; if (ip6_msource_tree_RB_GETCOLOR(tmp) == 1) { do { ip6_msource_tree_RB_SETCOLOR(tmp, 0); ip6_msource_tree_RB_SETCOLOR (parent, 1); } while ( 0); do { (tmp) = (parent)->im6s_link .rbe_right; if (((parent)->im6s_link.rbe_right = (tmp)-> im6s_link.rbe_left) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((tmp)->im6s_link.rbe_left,(parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT(tmp, ip6_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_left = (parent); ip6_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); tmp = (parent)->im6s_link.rbe_right; } if (((tmp)-> im6s_link.rbe_left == ((void *)0) || ip6_msource_tree_RB_GETCOLOR ((tmp)->im6s_link.rbe_left) == 0) && ((tmp)->im6s_link .rbe_right == ((void *)0) || ip6_msource_tree_RB_GETCOLOR((tmp )->im6s_link.rbe_right) == 0)) { ip6_msource_tree_RB_SETCOLOR (tmp, 1); elm = parent; parent = ip6_msource_tree_RB_GETPARENT (elm); } else { if ((tmp)->im6s_link.rbe_right == ((void * )0) || ip6_msource_tree_RB_GETCOLOR((tmp)->im6s_link.rbe_right ) == 0) { struct ip6_msource *oleft; if ((oleft = (tmp)->im6s_link .rbe_left) != ((void *)0)) ip6_msource_tree_RB_SETCOLOR(oleft , 0); ip6_msource_tree_RB_SETCOLOR(tmp, 1); do { (oleft) = (tmp )->im6s_link.rbe_left; if (((tmp)->im6s_link.rbe_left = (oleft)->im6s_link.rbe_right) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((oleft)->im6s_link.rbe_right, (tmp)); } (void)(tmp); if ( ip6_msource_tree_RB_SETPARENT(oleft, ip6_msource_tree_RB_GETPARENT (tmp)) != ((void *)0)) { if ((tmp) == (ip6_msource_tree_RB_GETPARENT (tmp))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (tmp))->im6s_link.rbe_left = (oleft); else (ip6_msource_tree_RB_GETPARENT (tmp))->im6s_link.rbe_right = (oleft); } else (head)->rbh_root = (oleft); (oleft)->im6s_link.rbe_right = (tmp); ip6_msource_tree_RB_SETPARENT (tmp, oleft); (void)(oleft); if ((ip6_msource_tree_RB_GETPARENT (oleft))) (void)(ip6_msource_tree_RB_GETPARENT(oleft)); } while ( 0); tmp = (parent)->im6s_link.rbe_right; } ip6_msource_tree_RB_SETCOLOR (tmp, (ip6_msource_tree_RB_GETCOLOR(parent))); ip6_msource_tree_RB_SETCOLOR (parent, 0); if ((tmp)->im6s_link.rbe_right) ip6_msource_tree_RB_SETCOLOR ((tmp)->im6s_link.rbe_right,0); do { (tmp) = (parent)-> im6s_link.rbe_right; if (((parent)->im6s_link.rbe_right = ( tmp)->im6s_link.rbe_left) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((tmp)->im6s_link.rbe_left,(parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT(tmp, ip6_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_left = (parent); ip6_msource_tree_RB_SETPARENT (parent, (tmp)); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); elm = (head)->rbh_root; break; } } else { tmp = (parent )->im6s_link.rbe_left; if (ip6_msource_tree_RB_GETCOLOR(tmp ) == 1) { do { ip6_msource_tree_RB_SETCOLOR(tmp, 0); ip6_msource_tree_RB_SETCOLOR (parent, 1); } while ( 0); do { (tmp) = (parent)->im6s_link .rbe_left; if (((parent)->im6s_link.rbe_left = (tmp)->im6s_link .rbe_right) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT(( tmp)->im6s_link.rbe_right, (parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT(tmp, ip6_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_right = (parent); ip6_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); tmp = (parent)->im6s_link.rbe_left; } if (((tmp)-> im6s_link.rbe_left == ((void *)0) || ip6_msource_tree_RB_GETCOLOR ((tmp)->im6s_link.rbe_left) == 0) && ((tmp)->im6s_link .rbe_right == ((void *)0) || ip6_msource_tree_RB_GETCOLOR((tmp )->im6s_link.rbe_right) == 0)) { ip6_msource_tree_RB_SETCOLOR (tmp, 1); elm = parent; parent = ip6_msource_tree_RB_GETPARENT (elm); } else { if ((tmp)->im6s_link.rbe_left == ((void *) 0) || ip6_msource_tree_RB_GETCOLOR((tmp)->im6s_link.rbe_left ) == 0) { struct ip6_msource *oright; if ((oright = (tmp)-> im6s_link.rbe_right) != ((void *)0)) ip6_msource_tree_RB_SETCOLOR (oright, 0); ip6_msource_tree_RB_SETCOLOR(tmp, 1); do { (oright ) = (tmp)->im6s_link.rbe_right; if (((tmp)->im6s_link.rbe_right = (oright)->im6s_link.rbe_left) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((oright)->im6s_link.rbe_left,(tmp)); } (void)(tmp); if (ip6_msource_tree_RB_SETPARENT (oright, ip6_msource_tree_RB_GETPARENT(tmp)) != ((void *)0)) { if ((tmp) == (ip6_msource_tree_RB_GETPARENT(tmp))->im6s_link .rbe_left) (ip6_msource_tree_RB_GETPARENT(tmp))->im6s_link .rbe_left = (oright); else (ip6_msource_tree_RB_GETPARENT(tmp ))->im6s_link.rbe_right = (oright); } else (head)->rbh_root = (oright); (oright)->im6s_link.rbe_left = (tmp); ip6_msource_tree_RB_SETPARENT (tmp, (oright)); (void)(oright); if ((ip6_msource_tree_RB_GETPARENT (oright))) (void)(ip6_msource_tree_RB_GETPARENT(oright)); } while ( 0); tmp = (parent)->im6s_link.rbe_left; } ip6_msource_tree_RB_SETCOLOR (tmp,(ip6_msource_tree_RB_GETCOLOR(parent))); ip6_msource_tree_RB_SETCOLOR (parent, 0); if ((tmp)->im6s_link.rbe_left) ip6_msource_tree_RB_SETCOLOR ((tmp)->im6s_link.rbe_left, 0); do { (tmp) = (parent)-> im6s_link.rbe_left; if (((parent)->im6s_link.rbe_left = (tmp )->im6s_link.rbe_right) != ((void *)0)) { ip6_msource_tree_RB_SETPARENT ((tmp)->im6s_link.rbe_right, (parent)); } (void)(parent); if (ip6_msource_tree_RB_SETPARENT(tmp, ip6_msource_tree_RB_GETPARENT (parent)) != ((void *)0)) { if ((parent) == (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left) (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_left = (tmp); else (ip6_msource_tree_RB_GETPARENT (parent))->im6s_link.rbe_right = (tmp); } else (head)-> rbh_root = (tmp); (tmp)->im6s_link.rbe_right = (parent); ip6_msource_tree_RB_SETPARENT (parent, tmp); (void)(tmp); if ((ip6_msource_tree_RB_GETPARENT (tmp))) (void)(ip6_msource_tree_RB_GETPARENT(tmp)); } while ( 0); elm = (head)->rbh_root; break; } } } if (elm) ip6_msource_tree_RB_SETCOLOR (elm, 0); } struct ip6_msource * ip6_msource_tree_RB_REMOVE(struct ip6_msource_tree *head, struct ip6_msource *elm) { struct ip6_msource *child, *parent, *old = elm; int color; if ((elm)->im6s_link .rbe_left == ((void *)0)) child = (elm)->im6s_link.rbe_right ; else if ((elm)->im6s_link.rbe_right == ((void *)0)) child = (elm)->im6s_link.rbe_left; else { struct ip6_msource *left ; elm = (elm)->im6s_link.rbe_right; while ((left = (elm)-> im6s_link.rbe_left) != ((void *)0)) elm = left; child = (elm) ->im6s_link.rbe_right; parent = ip6_msource_tree_RB_GETPARENT (elm); color = ip6_msource_tree_RB_GETCOLOR(elm); if (child) ip6_msource_tree_RB_SETPARENT (child, parent); if (parent) { if ((parent)->im6s_link.rbe_left == elm) (parent)->im6s_link.rbe_left = child; else (parent )->im6s_link.rbe_right = child; (void)(parent); } else (head )->rbh_root = child; if (ip6_msource_tree_RB_GETPARENT(elm ) == old) parent = elm; (elm)->im6s_link = (old)->im6s_link ; if (ip6_msource_tree_RB_GETPARENT(old)) { if ((ip6_msource_tree_RB_GETPARENT (old))->im6s_link.rbe_left == old) (ip6_msource_tree_RB_GETPARENT (old))->im6s_link.rbe_left = elm; else (ip6_msource_tree_RB_GETPARENT (old))->im6s_link.rbe_right = elm; (void)(ip6_msource_tree_RB_GETPARENT (old)); } else (head)->rbh_root = elm; ip6_msource_tree_RB_SETPARENT ((old)->im6s_link.rbe_left, elm); if ((old)->im6s_link. rbe_right) ip6_msource_tree_RB_SETPARENT((old)->im6s_link. rbe_right, elm); if (parent) { left = parent; do { (void)(left ); } while ((left = ip6_msource_tree_RB_GETPARENT(left)) != ( (void *)0)); } goto color; } parent = ip6_msource_tree_RB_GETPARENT (elm); color = ip6_msource_tree_RB_GETCOLOR(elm); if (child) ip6_msource_tree_RB_SETPARENT (child, parent); if (parent) { if ((parent)->im6s_link.rbe_left == elm) (parent)->im6s_link.rbe_left = child; else (parent )->im6s_link.rbe_right = child; (void)(parent); } else (head )->rbh_root = child; color: if (color == 0) ip6_msource_tree_RB_REMOVE_COLOR (head, parent, child); return (old); } struct ip6_msource * ip6_msource_tree_RB_INSERT (struct ip6_msource_tree *head, struct ip6_msource *elm) { struct ip6_msource *tmp; struct ip6_msource *parent = ((void *)0); int comp = 0; tmp = (head)->rbh_root; while (tmp) { parent = tmp ; comp = (ip6_msource_cmp)(elm, parent); if (comp < 0) tmp = (tmp)->im6s_link.rbe_left; else if (comp > 0) tmp = ( tmp)->im6s_link.rbe_right; else return (tmp); } do { ip6_msource_tree_RB_SETPARENT (elm, parent); (elm)->im6s_link.rbe_left = (elm)->im6s_link .rbe_right = ((void *)0); ip6_msource_tree_RB_SETCOLOR(elm, 1 ); } while ( 0); if (parent != ((void *)0)) { if (comp < 0 ) (parent)->im6s_link.rbe_left = elm; else (parent)->im6s_link .rbe_right = elm; (void)(parent); } else (head)->rbh_root = elm; ip6_msource_tree_RB_INSERT_COLOR(head, elm); return ((( void *)0)); } struct ip6_msource * ip6_msource_tree_RB_FIND(struct ip6_msource_tree *head, struct ip6_msource *elm) { struct ip6_msource *tmp = (head)->rbh_root; int comp; while (tmp) { comp = ip6_msource_cmp (elm, tmp); if (comp < 0) tmp = (tmp)->im6s_link.rbe_left ; else if (comp > 0) tmp = (tmp)->im6s_link.rbe_right; else return (tmp); } return (((void *)0)); } struct ip6_msource * ip6_msource_tree_RB_NEXT(struct ip6_msource *elm) { if ((elm )->im6s_link.rbe_right) { elm = (elm)->im6s_link.rbe_right ; while ((elm)->im6s_link.rbe_left) elm = (elm)->im6s_link .rbe_left; } else { if (ip6_msource_tree_RB_GETPARENT(elm) && (elm == (ip6_msource_tree_RB_GETPARENT(elm))->im6s_link.rbe_left )) elm = ip6_msource_tree_RB_GETPARENT(elm); else { while (ip6_msource_tree_RB_GETPARENT (elm) && (elm == (ip6_msource_tree_RB_GETPARENT(elm)) ->im6s_link.rbe_right)) elm = ip6_msource_tree_RB_GETPARENT (elm); elm = ip6_msource_tree_RB_GETPARENT(elm); } } return ( elm); } struct ip6_msource * ip6_msource_tree_RB_MINMAX(struct ip6_msource_tree *head, int val) { struct ip6_msource *tmp = (head)->rbh_root; struct ip6_msource *parent = ((void *)0 ); while (tmp) { parent = tmp; if (val < 0) tmp = (tmp)-> im6s_link.rbe_left; else tmp = (tmp)->im6s_link.rbe_right; } return (parent); } struct ip6_msource * ip6_msource_tree_RB_PREV (struct ip6_msource *elm) { if ((elm)->im6s_link.rbe_left) { elm = (elm)->im6s_link.rbe_left; while ((elm)->im6s_link .rbe_right) elm = (elm)->im6s_link.rbe_right; } else { if ( ip6_msource_tree_RB_GETPARENT(elm) && (elm == (ip6_msource_tree_RB_GETPARENT (elm))->im6s_link.rbe_right)) elm = ip6_msource_tree_RB_GETPARENT (elm); else { while (ip6_msource_tree_RB_GETPARENT(elm) && (elm == (ip6_msource_tree_RB_GETPARENT(elm))->im6s_link.rbe_left )) elm = ip6_msource_tree_RB_GETPARENT(elm); elm = ip6_msource_tree_RB_GETPARENT (elm); } } return (elm); }; | |||
175 | ||||
176 | #define IN6M_TRACE_HIST_SIZE32 32 /* size of trace history */ | |||
177 | ||||
178 | /* For gdb */ | |||
179 | __private_extern__ unsigned int in6m_trace_hist_size = IN6M_TRACE_HIST_SIZE32; | |||
180 | ||||
181 | struct in6_multi_dbg { | |||
182 | struct in6_multi in6m; /* in6_multi */ | |||
183 | u_int16_t in6m_refhold_cnt; /* # of ref */ | |||
184 | u_int16_t in6m_refrele_cnt; /* # of rele */ | |||
185 | /* | |||
186 | * Circular lists of in6m_addref and in6m_remref callers. | |||
187 | */ | |||
188 | ctrace_t in6m_refhold[IN6M_TRACE_HIST_SIZE32]; | |||
189 | ctrace_t in6m_refrele[IN6M_TRACE_HIST_SIZE32]; | |||
190 | /* | |||
191 | * Trash list linkage | |||
192 | */ | |||
193 | TAILQ_ENTRY(in6_multi_dbg)struct { struct in6_multi_dbg *tqe_next; struct in6_multi_dbg **tqe_prev; } in6m_trash_link; | |||
194 | }; | |||
195 | ||||
196 | /* List of trash in6_multi entries protected by in6m_trash_lock */ | |||
197 | static TAILQ_HEAD(, in6_multi_dbg)struct { struct in6_multi_dbg *tqh_first; struct in6_multi_dbg **tqh_last; } in6m_trash_head; | |||
198 | static decl_lck_mtx_data(, in6m_trash_lock)lck_mtx_t in6m_trash_lock;; | |||
199 | ||||
200 | #if DEBUG | |||
201 | static unsigned int in6m_debug = 1; /* debugging (enabled) */ | |||
202 | #else | |||
203 | static unsigned int in6m_debug; /* debugging (disabled) */ | |||
204 | #endif /* !DEBUG */ | |||
205 | static unsigned int in6m_size; /* size of zone element */ | |||
206 | static struct zone *in6m_zone; /* zone for in6_multi */ | |||
207 | ||||
208 | #define IN6M_ZONE_MAX64 64 /* maximum elements in zone */ | |||
209 | #define IN6M_ZONE_NAME"in6_multi" "in6_multi" /* zone name */ | |||
210 | ||||
211 | static unsigned int imm_size; /* size of zone element */ | |||
212 | static struct zone *imm_zone; /* zone for in6_multi_mship */ | |||
213 | ||||
214 | #define IMM_ZONE_MAX64 64 /* maximum elements in zone */ | |||
215 | #define IMM_ZONE_NAME"in6_multi_mship" "in6_multi_mship" /* zone name */ | |||
216 | ||||
217 | #define IP6MS_ZONE_MAX64 64 /* maximum elements in zone */ | |||
218 | #define IP6MS_ZONE_NAME"ip6_msource" "ip6_msource" /* zone name */ | |||
219 | ||||
220 | static unsigned int ip6ms_size; /* size of zone element */ | |||
221 | static struct zone *ip6ms_zone; /* zone for ip6_msource */ | |||
222 | ||||
223 | #define IN6MS_ZONE_MAX64 64 /* maximum elements in zone */ | |||
224 | #define IN6MS_ZONE_NAME"in6_msource" "in6_msource" /* zone name */ | |||
225 | ||||
226 | static unsigned int in6ms_size; /* size of zone element */ | |||
227 | static struct zone *in6ms_zone; /* zone for in6_msource */ | |||
228 | ||||
229 | /* Lock group and attribute for in6_multihead_lock lock */ | |||
230 | static lck_attr_t *in6_multihead_lock_attr; | |||
231 | static lck_grp_t *in6_multihead_lock_grp; | |||
232 | static lck_grp_attr_t *in6_multihead_lock_grp_attr; | |||
233 | ||||
234 | static decl_lck_rw_data(, in6_multihead_lock)lck_rw_t in6_multihead_lock;; | |||
235 | struct in6_multihead in6_multihead; | |||
236 | ||||
237 | static struct in6_multi *in6_multi_alloc(int); | |||
238 | static void in6_multi_free(struct in6_multi *); | |||
239 | static void in6_multi_attach(struct in6_multi *); | |||
240 | static struct in6_multi_mship *in6_multi_mship_alloc(int); | |||
241 | static void in6_multi_mship_free(struct in6_multi_mship *); | |||
242 | static void in6m_trace(struct in6_multi *, int); | |||
243 | ||||
244 | static struct ip6_msource *ip6ms_alloc(int); | |||
245 | static void ip6ms_free(struct ip6_msource *); | |||
246 | static struct in6_msource *in6ms_alloc(int); | |||
247 | static void in6ms_free(struct in6_msource *); | |||
248 | ||||
249 | /* | |||
250 | * IPv6 source tree comparison function. | |||
251 | * | |||
252 | * An ordered predicate is necessary; bcmp() is not documented to return | |||
253 | * an indication of order, memcmp() is, and is an ISO C99 requirement. | |||
254 | */ | |||
255 | static __inline int | |||
256 | ip6_msource_cmp(const struct ip6_msource *a, const struct ip6_msource *b) | |||
257 | { | |||
258 | return (memcmp(&a->im6s_addr, &b->im6s_addr, sizeof(struct in6_addr))); | |||
259 | } | |||
260 | ||||
261 | /* | |||
262 | * Inline function which wraps assertions for a valid ifp. | |||
263 | */ | |||
264 | static __inline__ int | |||
265 | in6m_is_ifp_detached(const struct in6_multi *inm) | |||
266 | { | |||
267 | VERIFY(inm->in6m_ifma != NULL)((void)(__builtin_expect(!!((long)((inm->in6m_ifma != ((void *)0)))), 1L) || assfail("inm->in6m_ifma != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 267))); | |||
268 | VERIFY(inm->in6m_ifp == inm->in6m_ifma->ifma_ifp)((void)(__builtin_expect(!!((long)((inm->in6m_ifp == inm-> in6m_ifma->ifma_ifp))), 1L) || assfail("inm->in6m_ifp == inm->in6m_ifma->ifma_ifp" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 268 ))); | |||
269 | ||||
270 | return (!ifnet_is_attached(inm->in6m_ifp, 0)); | |||
271 | } | |||
272 | ||||
273 | /* | |||
274 | * Initialize an in6_mfilter structure to a known state at t0, t1 | |||
275 | * with an empty source filter list. | |||
276 | */ | |||
277 | static __inline__ void | |||
278 | im6f_init(struct in6_mfilter *imf, const int st0, const int st1) | |||
279 | { | |||
280 | memset(imf, 0, sizeof(struct in6_mfilter)); | |||
281 | RB_INIT(&imf->im6f_sources)do { (&imf->im6f_sources)->rbh_root = ((void *)0); } while ( 0); | |||
282 | imf->im6f_st[0] = st0; | |||
283 | imf->im6f_st[1] = st1; | |||
284 | } | |||
285 | ||||
286 | /* | |||
287 | * Resize the ip6_moptions vector to the next power-of-two minus 1. | |||
288 | */ | |||
289 | static int | |||
290 | im6o_grow(struct ip6_moptions *imo, size_t newmax) | |||
291 | { | |||
292 | struct in6_multi **nmships; | |||
293 | struct in6_multi **omships; | |||
294 | struct in6_mfilter *nmfilters; | |||
295 | struct in6_mfilter *omfilters; | |||
296 | size_t idx; | |||
297 | size_t oldmax; | |||
298 | ||||
299 | IM6O_LOCK_ASSERT_HELD(imo)lck_mtx_assert(&(imo)->im6o_lock, 1); | |||
300 | ||||
301 | nmships = NULL((void *)0); | |||
302 | nmfilters = NULL((void *)0); | |||
303 | omships = imo->im6o_membership; | |||
304 | omfilters = imo->im6o_mfilters; | |||
305 | oldmax = imo->im6o_max_memberships; | |||
306 | if (newmax == 0) | |||
307 | newmax = ((oldmax + 1) * 2) - 1; | |||
308 | ||||
309 | if (newmax > IPV6_MAX_MEMBERSHIPS4095) | |||
310 | return (ETOOMANYREFS59); | |||
311 | ||||
312 | if ((nmships = (struct in6_multi **)_REALLOC(omships,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in6_multi *) * newmax, 113, 0x0000 | 0x0004, &site); }) | |||
313 | sizeof (struct in6_multi *) * newmax, M_IP6MOPTS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in6_multi *) * newmax, 113, 0x0000 | 0x0004, &site); }) | |||
314 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omships, sizeof (struct in6_multi *) * newmax, 113, 0x0000 | 0x0004, &site); })) == NULL((void *)0)) | |||
315 | return (ENOMEM12); | |||
316 | ||||
317 | imo->im6o_membership = nmships; | |||
318 | ||||
319 | if ((nmfilters = (struct in6_mfilter *)_REALLOC(omfilters,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in6_mfilter) * newmax , 112, 0x0000 | 0x0004, &site); }) | |||
320 | sizeof (struct in6_mfilter) * newmax, M_IN6MFILTER,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in6_mfilter) * newmax , 112, 0x0000 | 0x0004, &site); }) | |||
321 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __REALLOC(omfilters, sizeof (struct in6_mfilter) * newmax , 112, 0x0000 | 0x0004, &site); })) == NULL((void *)0)) | |||
322 | return (ENOMEM12); | |||
323 | ||||
324 | imo->im6o_mfilters = nmfilters; | |||
325 | ||||
326 | /* Initialize newly allocated source filter heads. */ | |||
327 | for (idx = oldmax; idx < newmax; idx++) | |||
328 | im6f_init(&nmfilters[idx], MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
329 | ||||
330 | imo->im6o_max_memberships = newmax; | |||
331 | ||||
332 | return (0); | |||
333 | } | |||
334 | ||||
335 | /* | |||
336 | * Find an IPv6 multicast group entry for this ip6_moptions instance | |||
337 | * which matches the specified group, and optionally an interface. | |||
338 | * Return its index into the array, or -1 if not found. | |||
339 | */ | |||
340 | static size_t | |||
341 | im6o_match_group(const struct ip6_moptions *imo, const struct ifnet *ifp, | |||
342 | const struct sockaddr *group) | |||
343 | { | |||
344 | const struct sockaddr_in6 *gsin6; | |||
345 | struct in6_multi *pinm; | |||
346 | int idx; | |||
347 | int nmships; | |||
348 | ||||
349 | IM6O_LOCK_ASSERT_HELD(__DECONST(struct ip6_moptions *, imo))lck_mtx_assert(&((struct ip6_moptions *) (long)(imo))-> im6o_lock, 1); | |||
350 | ||||
351 | gsin6 = (struct sockaddr_in6 *)(uintptr_t)(size_t)group; | |||
352 | ||||
353 | /* The im6o_membership array may be lazy allocated. */ | |||
354 | if (imo->im6o_membership == NULL((void *)0) || imo->im6o_num_memberships == 0) | |||
355 | return (-1); | |||
356 | ||||
357 | nmships = imo->im6o_num_memberships; | |||
358 | for (idx = 0; idx < nmships; idx++) { | |||
359 | pinm = imo->im6o_membership[idx]; | |||
360 | if (pinm == NULL((void *)0)) | |||
361 | continue; | |||
362 | IN6M_LOCK(pinm)lck_mtx_lock(&(pinm)->in6m_lock); | |||
363 | if ((ifp == NULL((void *)0) || (pinm->in6m_ifp == ifp)) && | |||
364 | IN6_ARE_ADDR_EQUAL(&pinm->in6m_addr,(bcmp(&(&pinm->in6m_addr)->__u6_addr.__u6_addr8 [0], &(&gsin6->sin6_addr)->__u6_addr.__u6_addr8 [0], sizeof (struct in6_addr)) == 0) | |||
365 | &gsin6->sin6_addr)(bcmp(&(&pinm->in6m_addr)->__u6_addr.__u6_addr8 [0], &(&gsin6->sin6_addr)->__u6_addr.__u6_addr8 [0], sizeof (struct in6_addr)) == 0)) { | |||
366 | IN6M_UNLOCK(pinm)lck_mtx_unlock(&(pinm)->in6m_lock); | |||
367 | break; | |||
368 | } | |||
369 | IN6M_UNLOCK(pinm)lck_mtx_unlock(&(pinm)->in6m_lock); | |||
370 | } | |||
371 | if (idx >= nmships) | |||
372 | idx = -1; | |||
373 | ||||
374 | return (idx); | |||
375 | } | |||
376 | ||||
377 | /* | |||
378 | * Find an IPv6 multicast source entry for this imo which matches | |||
379 | * the given group index for this socket, and source address. | |||
380 | * | |||
381 | * XXX TODO: The scope ID, if present in src, is stripped before | |||
382 | * any comparison. We SHOULD enforce scope/zone checks where the source | |||
383 | * filter entry has a link scope. | |||
384 | * | |||
385 | * NOTE: This does not check if the entry is in-mode, merely if | |||
386 | * it exists, which may not be the desired behaviour. | |||
387 | */ | |||
388 | static struct in6_msource * | |||
389 | im6o_match_source(const struct ip6_moptions *imo, const size_t gidx, | |||
390 | const struct sockaddr *src) | |||
391 | { | |||
392 | struct ip6_msource find; | |||
393 | struct in6_mfilter *imf; | |||
394 | struct ip6_msource *ims; | |||
395 | const sockunion_t *psa; | |||
396 | ||||
397 | IM6O_LOCK_ASSERT_HELD(__DECONST(struct ip6_moptions *, imo))lck_mtx_assert(&((struct ip6_moptions *) (long)(imo))-> im6o_lock, 1); | |||
398 | ||||
399 | VERIFY(src->sa_family == AF_INET6)((void)(__builtin_expect(!!((long)((src->sa_family == 30)) ), 1L) || assfail("src->sa_family == AF_INET6", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 399))); | |||
400 | VERIFY(gidx != (size_t)-1 && gidx < imo->im6o_num_memberships)((void)(__builtin_expect(!!((long)((gidx != (size_t)-1 && gidx < imo->im6o_num_memberships))), 1L) || assfail("gidx != (size_t)-1 && gidx < imo->im6o_num_memberships" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 400 ))); | |||
401 | ||||
402 | /* The im6o_mfilters array may be lazy allocated. */ | |||
403 | if (imo->im6o_mfilters == NULL((void *)0)) | |||
404 | return (NULL((void *)0)); | |||
405 | imf = &imo->im6o_mfilters[gidx]; | |||
406 | ||||
407 | psa = (sockunion_t *)(uintptr_t)(size_t)src; | |||
408 | find.im6s_addr = psa->sin6.sin6_addr; | |||
409 | in6_clearscope(&find.im6s_addr); /* XXX */ | |||
410 | ims = RB_FIND(ip6_msource_tree, &imf->im6f_sources, &find)ip6_msource_tree_RB_FIND(&imf->im6f_sources, &find ); | |||
411 | ||||
412 | return ((struct in6_msource *)ims); | |||
413 | } | |||
414 | ||||
415 | /* | |||
416 | * Perform filtering for multicast datagrams on a socket by group and source. | |||
417 | * | |||
418 | * Returns 0 if a datagram should be allowed through, or various error codes | |||
419 | * if the socket was not a member of the group, or the source was muted, etc. | |||
420 | */ | |||
421 | int | |||
422 | im6o_mc_filter(const struct ip6_moptions *imo, const struct ifnet *ifp, | |||
423 | const struct sockaddr *group, const struct sockaddr *src) | |||
424 | { | |||
425 | size_t gidx; | |||
426 | struct in6_msource *ims; | |||
427 | int mode; | |||
428 | ||||
429 | IM6O_LOCK_ASSERT_HELD(__DECONST(struct ip6_moptions *, imo))lck_mtx_assert(&((struct ip6_moptions *) (long)(imo))-> im6o_lock, 1); | |||
430 | VERIFY(ifp != NULL)((void)(__builtin_expect(!!((long)((ifp != ((void *)0)))), 1L ) || assfail("ifp != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 430))); | |||
431 | ||||
432 | gidx = im6o_match_group(imo, ifp, group); | |||
433 | if (gidx == (size_t)-1) | |||
434 | return (MCAST_NOTGMEMBER1); | |||
435 | ||||
436 | /* | |||
437 | * Check if the source was included in an (S,G) join. | |||
438 | * Allow reception on exclusive memberships by default, | |||
439 | * reject reception on inclusive memberships by default. | |||
440 | * Exclude source only if an in-mode exclude filter exists. | |||
441 | * Include source only if an in-mode include filter exists. | |||
442 | * NOTE: We are comparing group state here at MLD t1 (now) | |||
443 | * with socket-layer t0 (since last downcall). | |||
444 | */ | |||
445 | mode = imo->im6o_mfilters[gidx].im6f_st[1]; | |||
446 | ims = im6o_match_source(imo, gidx, src); | |||
447 | ||||
448 | if ((ims == NULL((void *)0) && mode == MCAST_INCLUDE1) || | |||
449 | (ims != NULL((void *)0) && ims->im6sl_st[0] != mode)) | |||
450 | return (MCAST_NOTSMEMBER2); | |||
451 | ||||
452 | return (MCAST_PASS0); | |||
453 | } | |||
454 | ||||
455 | /* | |||
456 | * Find and return a reference to an in6_multi record for (ifp, group), | |||
457 | * and bump its reference count. | |||
458 | * If one does not exist, try to allocate it, and update link-layer multicast | |||
459 | * filters on ifp to listen for group. | |||
460 | * Assumes the IN6_MULTI lock is held across the call. | |||
461 | * Return 0 if successful, otherwise return an appropriate error code. | |||
462 | */ | |||
463 | static int | |||
464 | in6_mc_get(struct ifnet *ifp, const struct in6_addr *group, | |||
465 | struct in6_multi **pinm) | |||
466 | { | |||
467 | struct sockaddr_in6 gsin6; | |||
468 | struct ifmultiaddr *ifma; | |||
469 | struct in6_multi *inm; | |||
470 | int error; | |||
471 | ||||
472 | *pinm = NULL((void *)0); | |||
473 | ||||
474 | in6_multihead_lock_shared(); | |||
475 | IN6_LOOKUP_MULTI(group, ifp, inm)do { struct in6_multistep _step; do { in6_multihead_lock_assert (0x03); (_step).i_in6m = in6_multihead.lh_first; do { in6_multihead_lock_assert (0x03); if ((((inm)) = ((_step)).i_in6m) != ((void *)0)) ((_step )).i_in6m = ((_step)).i_in6m->in6m_entry.le_next; } while ( 0); } while (0); while ((inm) != ((void *)0)) { lck_mtx_lock_spin (&(inm)->in6m_lock); if ((inm)->in6m_ifp == (ifp) && (bcmp(&(&(inm)->in6m_addr)->__u6_addr.__u6_addr8 [0], &((group))->__u6_addr.__u6_addr8[0], sizeof (struct in6_addr)) == 0)) { in6m_addref(inm, 1); lck_mtx_unlock(& (inm)->in6m_lock); break; } lck_mtx_unlock(&(inm)-> in6m_lock); do { in6_multihead_lock_assert(0x03); if (((inm) = (_step).i_in6m) != ((void *)0)) (_step).i_in6m = (_step).i_in6m ->in6m_entry.le_next; } while (0); } } while (0); | |||
476 | if (inm != NULL((void *)0)) { | |||
477 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
478 | VERIFY(inm->in6m_reqcnt >= 1)((void)(__builtin_expect(!!((long)((inm->in6m_reqcnt >= 1))), 1L) || assfail("inm->in6m_reqcnt >= 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 478))); | |||
479 | inm->in6m_reqcnt++; | |||
480 | VERIFY(inm->in6m_reqcnt != 0)((void)(__builtin_expect(!!((long)((inm->in6m_reqcnt != 0) )), 1L) || assfail("inm->in6m_reqcnt != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 480))); | |||
481 | *pinm = inm; | |||
482 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
483 | in6_multihead_lock_done(); | |||
484 | /* | |||
485 | * We already joined this group; return the in6m | |||
486 | * with a refcount held (via lookup) for caller. | |||
487 | */ | |||
488 | return (0); | |||
489 | } | |||
490 | in6_multihead_lock_done(); | |||
491 | ||||
492 | memset(&gsin6, 0, sizeof(gsin6)); | |||
493 | gsin6.sin6_family = AF_INET630; | |||
494 | gsin6.sin6_len = sizeof(struct sockaddr_in6); | |||
495 | gsin6.sin6_addr = *group; | |||
496 | ||||
497 | /* | |||
498 | * Check if a link-layer group is already associated | |||
499 | * with this network-layer group on the given ifnet. | |||
500 | */ | |||
501 | error = if_addmulti(ifp, (struct sockaddr *)&gsin6, &ifma); | |||
502 | if (error != 0) | |||
503 | return (error); | |||
504 | ||||
505 | /* | |||
506 | * See comments in in6m_remref() for access to ifma_protospec. | |||
507 | */ | |||
508 | in6_multihead_lock_exclusive(); | |||
509 | IFMA_LOCK(ifma)lck_mtx_lock(&(ifma)->ifma_lock); | |||
510 | if ((inm = ifma->ifma_protospec) != NULL((void *)0)) { | |||
511 | VERIFY(ifma->ifma_addr != NULL)((void)(__builtin_expect(!!((long)((ifma->ifma_addr != ((void *)0)))), 1L) || assfail("ifma->ifma_addr != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 511))); | |||
512 | VERIFY(ifma->ifma_addr->sa_family == AF_INET6)((void)(__builtin_expect(!!((long)((ifma->ifma_addr->sa_family == 30))), 1L) || assfail("ifma->ifma_addr->sa_family == AF_INET6" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 512 ))); | |||
513 | IN6M_ADDREF(inm)in6m_addref(inm, 0); /* for caller */ | |||
514 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
515 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
516 | VERIFY(inm->in6m_ifma == ifma)((void)(__builtin_expect(!!((long)((inm->in6m_ifma == ifma ))), 1L) || assfail("inm->in6m_ifma == ifma", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 516))); | |||
517 | VERIFY(inm->in6m_ifp == ifp)((void)(__builtin_expect(!!((long)((inm->in6m_ifp == ifp)) ), 1L) || assfail("inm->in6m_ifp == ifp", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 517))); | |||
518 | VERIFY(IN6_ARE_ADDR_EQUAL(&inm->in6m_addr, group))((void)(__builtin_expect(!!((long)(((bcmp(&(&inm-> in6m_addr)->__u6_addr.__u6_addr8[0], &(group)->__u6_addr .__u6_addr8[0], sizeof (struct in6_addr)) == 0)))), 1L) || assfail ("IN6_ARE_ADDR_EQUAL(&inm->in6m_addr, group)", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 518))); | |||
519 | if (inm->in6m_debug & IFD_ATTACHED0x1) { | |||
520 | VERIFY(inm->in6m_reqcnt >= 1)((void)(__builtin_expect(!!((long)((inm->in6m_reqcnt >= 1))), 1L) || assfail("inm->in6m_reqcnt >= 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 520))); | |||
521 | inm->in6m_reqcnt++; | |||
522 | VERIFY(inm->in6m_reqcnt != 0)((void)(__builtin_expect(!!((long)((inm->in6m_reqcnt != 0) )), 1L) || assfail("inm->in6m_reqcnt != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 522))); | |||
523 | *pinm = inm; | |||
524 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
525 | in6_multihead_lock_done(); | |||
526 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
527 | /* | |||
528 | * We lost the race with another thread doing | |||
529 | * in6_mc_get(); since this group has already | |||
530 | * been joined; return the inm with a refcount | |||
531 | * held for caller. | |||
532 | */ | |||
533 | return (0); | |||
534 | } | |||
535 | /* | |||
536 | * We lost the race with another thread doing in6_delmulti(); | |||
537 | * the inm referring to the ifma has been detached, thus we | |||
538 | * reattach it back to the in6_multihead list, and return the | |||
539 | * inm with a refcount held for the caller. | |||
540 | */ | |||
541 | in6_multi_attach(inm); | |||
542 | VERIFY((inm->in6m_debug &((void)(__builtin_expect(!!((long)(((inm->in6m_debug & (0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->in6m_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 543 ))) | |||
543 | (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED)((void)(__builtin_expect(!!((long)(((inm->in6m_debug & (0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->in6m_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 543 ))); | |||
544 | *pinm = inm; | |||
545 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
546 | in6_multihead_lock_done(); | |||
547 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
548 | return (0); | |||
549 | } | |||
550 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
551 | ||||
552 | /* | |||
553 | * A new in6_multi record is needed; allocate and initialize it. | |||
554 | * We DO NOT perform an MLD join as the in6_ layer may need to | |||
555 | * push an initial source list down to MLD to support SSM. | |||
556 | * | |||
557 | * The initial source filter state is INCLUDE, {} as per the RFC. | |||
558 | * Pending state-changes per group are subject to a bounds check. | |||
559 | */ | |||
560 | inm = in6_multi_alloc(M_WAITOK0x0000); | |||
561 | if (inm == NULL((void *)0)) { | |||
562 | in6_multihead_lock_done(); | |||
563 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
564 | return (ENOMEM12); | |||
565 | } | |||
566 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
567 | inm->in6m_addr = *group; | |||
568 | inm->in6m_ifp = ifp; | |||
569 | inm->in6m_mli = MLD_IFINFO(ifp)((ifp)->if_mli); | |||
570 | VERIFY(inm->in6m_mli != NULL)((void)(__builtin_expect(!!((long)((inm->in6m_mli != ((void *)0)))), 1L) || assfail("inm->in6m_mli != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 570))); | |||
571 | MLI_ADDREF(inm->in6m_mli)mli_addref(inm->in6m_mli, 0); | |||
572 | inm->in6m_ifma = ifma; /* keep refcount from if_addmulti() */ | |||
573 | inm->in6m_state = MLD_NOT_MEMBER0; | |||
574 | /* | |||
575 | * Pending state-changes per group are subject to a bounds check. | |||
576 | */ | |||
577 | inm->in6m_scq.ifq_maxlen = MLD_MAX_STATE_CHANGES24; | |||
578 | inm->in6m_st[0].iss_fmode = MCAST_UNDEFINED0; | |||
579 | inm->in6m_st[1].iss_fmode = MCAST_UNDEFINED0; | |||
580 | RB_INIT(&inm->in6m_srcs)do { (&inm->in6m_srcs)->rbh_root = ((void *)0); } while ( 0); | |||
581 | *pinm = inm; | |||
582 | in6_multi_attach(inm); | |||
583 | VERIFY((inm->in6m_debug &((void)(__builtin_expect(!!((long)(((inm->in6m_debug & (0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->in6m_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 584 ))) | |||
584 | (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED)((void)(__builtin_expect(!!((long)(((inm->in6m_debug & (0x1 | 0x10)) == 0x1))), 1L) || assfail("(inm->in6m_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 584 ))); | |||
585 | IN6M_ADDREF_LOCKED(inm)in6m_addref(inm, 1); /* for caller */ | |||
586 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
587 | ||||
588 | IFMA_LOCK(ifma)lck_mtx_lock(&(ifma)->ifma_lock); | |||
589 | VERIFY(ifma->ifma_protospec == NULL)((void)(__builtin_expect(!!((long)((ifma->ifma_protospec == ((void *)0)))), 1L) || assfail("ifma->ifma_protospec == NULL" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 589 ))); | |||
590 | ifma->ifma_protospec = inm; | |||
591 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
592 | in6_multihead_lock_done(); | |||
593 | ||||
594 | return (0); | |||
595 | } | |||
596 | ||||
597 | /* | |||
598 | * Clear recorded source entries for a group. | |||
599 | * Used by the MLD code. Caller must hold the IN6_MULTI lock. | |||
600 | * FIXME: Should reap. | |||
601 | */ | |||
602 | void | |||
603 | in6m_clear_recorded(struct in6_multi *inm) | |||
604 | { | |||
605 | struct ip6_msource *ims; | |||
606 | ||||
607 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
608 | ||||
609 | RB_FOREACH(ims, ip6_msource_tree, &inm->in6m_srcs)for ((ims) = ip6_msource_tree_RB_MINMAX(&inm->in6m_srcs , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
610 | if (ims->im6s_stp) { | |||
611 | ims->im6s_stp = 0; | |||
612 | --inm->in6m_st[1].iss_rec; | |||
613 | } | |||
614 | } | |||
615 | VERIFY(inm->in6m_st[1].iss_rec == 0)((void)(__builtin_expect(!!((long)((inm->in6m_st[1].iss_rec == 0))), 1L) || assfail("inm->in6m_st[1].iss_rec == 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 615))); | |||
616 | } | |||
617 | ||||
618 | /* | |||
619 | * Record a source as pending for a Source-Group MLDv2 query. | |||
620 | * This lives here as it modifies the shared tree. | |||
621 | * | |||
622 | * inm is the group descriptor. | |||
623 | * naddr is the address of the source to record in network-byte order. | |||
624 | * | |||
625 | * If the net.inet6.mld.sgalloc sysctl is non-zero, we will | |||
626 | * lazy-allocate a source node in response to an SG query. | |||
627 | * Otherwise, no allocation is performed. This saves some memory | |||
628 | * with the trade-off that the source will not be reported to the | |||
629 | * router if joined in the window between the query response and | |||
630 | * the group actually being joined on the local host. | |||
631 | * | |||
632 | * VIMAGE: XXX: Currently the mld_sgalloc feature has been removed. | |||
633 | * This turns off the allocation of a recorded source entry if | |||
634 | * the group has not been joined. | |||
635 | * | |||
636 | * Return 0 if the source didn't exist or was already marked as recorded. | |||
637 | * Return 1 if the source was marked as recorded by this function. | |||
638 | * Return <0 if any error occured (negated errno code). | |||
639 | */ | |||
640 | int | |||
641 | in6m_record_source(struct in6_multi *inm, const struct in6_addr *addr) | |||
642 | { | |||
643 | struct ip6_msource find; | |||
644 | struct ip6_msource *ims, *nims; | |||
645 | ||||
646 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
647 | ||||
648 | find.im6s_addr = *addr; | |||
649 | ims = RB_FIND(ip6_msource_tree, &inm->in6m_srcs, &find)ip6_msource_tree_RB_FIND(&inm->in6m_srcs, &find); | |||
650 | if (ims && ims->im6s_stp) | |||
651 | return (0); | |||
652 | if (ims == NULL((void *)0)) { | |||
653 | if (inm->in6m_nsrc == in6_mcast_maxgrpsrc) | |||
654 | return (-ENOSPC28); | |||
655 | nims = ip6ms_alloc(M_WAITOK0x0000); | |||
656 | if (nims == NULL((void *)0)) | |||
657 | return (-ENOMEM12); | |||
658 | nims->im6s_addr = find.im6s_addr; | |||
659 | RB_INSERT(ip6_msource_tree, &inm->in6m_srcs, nims)ip6_msource_tree_RB_INSERT(&inm->in6m_srcs, nims); | |||
660 | ++inm->in6m_nsrc; | |||
661 | ims = nims; | |||
662 | } | |||
663 | ||||
664 | /* | |||
665 | * Mark the source as recorded and update the recorded | |||
666 | * source count. | |||
667 | */ | |||
668 | ++ims->im6s_stp; | |||
669 | ++inm->in6m_st[1].iss_rec; | |||
670 | ||||
671 | return (1); | |||
672 | } | |||
673 | ||||
674 | /* | |||
675 | * Return a pointer to an in6_msource owned by an in6_mfilter, | |||
676 | * given its source address. | |||
677 | * Lazy-allocate if needed. If this is a new entry its filter state is | |||
678 | * undefined at t0. | |||
679 | * | |||
680 | * imf is the filter set being modified. | |||
681 | * addr is the source address. | |||
682 | * | |||
683 | * Caller is expected to be holding im6o_lock. | |||
684 | */ | |||
685 | static int | |||
686 | im6f_get_source(struct in6_mfilter *imf, const struct sockaddr_in6 *psin, | |||
687 | struct in6_msource **plims) | |||
688 | { | |||
689 | struct ip6_msource find; | |||
690 | struct ip6_msource *ims; | |||
691 | struct in6_msource *lims; | |||
692 | int error; | |||
693 | ||||
694 | error = 0; | |||
695 | ims = NULL((void *)0); | |||
696 | lims = NULL((void *)0); | |||
697 | ||||
698 | find.im6s_addr = psin->sin6_addr; | |||
699 | ims = RB_FIND(ip6_msource_tree, &imf->im6f_sources, &find)ip6_msource_tree_RB_FIND(&imf->im6f_sources, &find ); | |||
700 | lims = (struct in6_msource *)ims; | |||
701 | if (lims == NULL((void *)0)) { | |||
702 | if (imf->im6f_nsrc == in6_mcast_maxsocksrc) | |||
703 | return (ENOSPC28); | |||
704 | lims = in6ms_alloc(M_WAITOK0x0000); | |||
705 | if (lims == NULL((void *)0)) | |||
706 | return (ENOMEM12); | |||
707 | lims->im6s_addr = find.im6s_addr; | |||
708 | lims->im6sl_st[0] = MCAST_UNDEFINED0; | |||
709 | RB_INSERT(ip6_msource_tree, &imf->im6f_sources,ip6_msource_tree_RB_INSERT(&imf->im6f_sources, (struct ip6_msource *)lims) | |||
710 | (struct ip6_msource *)lims)ip6_msource_tree_RB_INSERT(&imf->im6f_sources, (struct ip6_msource *)lims); | |||
711 | ++imf->im6f_nsrc; | |||
712 | } | |||
713 | ||||
714 | *plims = lims; | |||
715 | ||||
716 | return (error); | |||
717 | } | |||
718 | ||||
719 | /* | |||
720 | * Graft a source entry into an existing socket-layer filter set, | |||
721 | * maintaining any required invariants and checking allocations. | |||
722 | * | |||
723 | * The source is marked as being in the new filter mode at t1. | |||
724 | * | |||
725 | * Return the pointer to the new node, otherwise return NULL. | |||
726 | * | |||
727 | * Caller is expected to be holding im6o_lock. | |||
728 | */ | |||
729 | static struct in6_msource * | |||
730 | im6f_graft(struct in6_mfilter *imf, const uint8_t st1, | |||
731 | const struct sockaddr_in6 *psin) | |||
732 | { | |||
733 | struct in6_msource *lims; | |||
734 | ||||
735 | lims = in6ms_alloc(M_WAITOK0x0000); | |||
736 | if (lims == NULL((void *)0)) | |||
737 | return (NULL((void *)0)); | |||
738 | lims->im6s_addr = psin->sin6_addr; | |||
739 | lims->im6sl_st[0] = MCAST_UNDEFINED0; | |||
740 | lims->im6sl_st[1] = st1; | |||
741 | RB_INSERT(ip6_msource_tree, &imf->im6f_sources,ip6_msource_tree_RB_INSERT(&imf->im6f_sources, (struct ip6_msource *)lims) | |||
742 | (struct ip6_msource *)lims)ip6_msource_tree_RB_INSERT(&imf->im6f_sources, (struct ip6_msource *)lims); | |||
743 | ++imf->im6f_nsrc; | |||
744 | ||||
745 | return (lims); | |||
746 | } | |||
747 | ||||
748 | /* | |||
749 | * Prune a source entry from an existing socket-layer filter set, | |||
750 | * maintaining any required invariants and checking allocations. | |||
751 | * | |||
752 | * The source is marked as being left at t1, it is not freed. | |||
753 | * | |||
754 | * Return 0 if no error occurred, otherwise return an errno value. | |||
755 | * | |||
756 | * Caller is expected to be holding im6o_lock. | |||
757 | */ | |||
758 | static int | |||
759 | im6f_prune(struct in6_mfilter *imf, const struct sockaddr_in6 *psin) | |||
760 | { | |||
761 | struct ip6_msource find; | |||
762 | struct ip6_msource *ims; | |||
763 | struct in6_msource *lims; | |||
764 | ||||
765 | find.im6s_addr = psin->sin6_addr; | |||
766 | ims = RB_FIND(ip6_msource_tree, &imf->im6f_sources, &find)ip6_msource_tree_RB_FIND(&imf->im6f_sources, &find ); | |||
767 | if (ims == NULL((void *)0)) | |||
768 | return (ENOENT2); | |||
769 | lims = (struct in6_msource *)ims; | |||
770 | lims->im6sl_st[1] = MCAST_UNDEFINED0; | |||
771 | return (0); | |||
772 | } | |||
773 | ||||
774 | /* | |||
775 | * Revert socket-layer filter set deltas at t1 to t0 state. | |||
776 | * | |||
777 | * Caller is expected to be holding im6o_lock. | |||
778 | */ | |||
779 | static void | |||
780 | im6f_rollback(struct in6_mfilter *imf) | |||
781 | { | |||
782 | struct ip6_msource *ims, *tims; | |||
783 | struct in6_msource *lims; | |||
784 | ||||
785 | RB_FOREACH_SAFE(ims, ip6_msource_tree, &imf->im6f_sources, tims)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip6_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
786 | lims = (struct in6_msource *)ims; | |||
787 | if (lims->im6sl_st[0] == lims->im6sl_st[1]) { | |||
788 | /* no change at t1 */ | |||
789 | continue; | |||
790 | } else if (lims->im6sl_st[0] != MCAST_UNDEFINED0) { | |||
791 | /* revert change to existing source at t1 */ | |||
792 | lims->im6sl_st[1] = lims->im6sl_st[0]; | |||
793 | } else { | |||
794 | /* revert source added t1 */ | |||
795 | MLD_PRINTF(("%s: free in6ms 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
796 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
797 | RB_REMOVE(ip6_msource_tree, &imf->im6f_sources, ims)ip6_msource_tree_RB_REMOVE(&imf->im6f_sources, ims); | |||
798 | in6ms_free(lims); | |||
799 | imf->im6f_nsrc--; | |||
800 | } | |||
801 | } | |||
802 | imf->im6f_st[1] = imf->im6f_st[0]; | |||
803 | } | |||
804 | ||||
805 | /* | |||
806 | * Mark socket-layer filter set as INCLUDE {} at t1. | |||
807 | * | |||
808 | * Caller is expected to be holding im6o_lock. | |||
809 | */ | |||
810 | void | |||
811 | im6f_leave(struct in6_mfilter *imf) | |||
812 | { | |||
813 | struct ip6_msource *ims; | |||
814 | struct in6_msource *lims; | |||
815 | ||||
816 | RB_FOREACH(ims, ip6_msource_tree, &imf->im6f_sources)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
817 | lims = (struct in6_msource *)ims; | |||
818 | lims->im6sl_st[1] = MCAST_UNDEFINED0; | |||
819 | } | |||
820 | imf->im6f_st[1] = MCAST_INCLUDE1; | |||
821 | } | |||
822 | ||||
823 | /* | |||
824 | * Mark socket-layer filter set deltas as committed. | |||
825 | * | |||
826 | * Caller is expected to be holding im6o_lock. | |||
827 | */ | |||
828 | static void | |||
829 | im6f_commit(struct in6_mfilter *imf) | |||
830 | { | |||
831 | struct ip6_msource *ims; | |||
832 | struct in6_msource *lims; | |||
833 | ||||
834 | RB_FOREACH(ims, ip6_msource_tree, &imf->im6f_sources)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
835 | lims = (struct in6_msource *)ims; | |||
836 | lims->im6sl_st[0] = lims->im6sl_st[1]; | |||
837 | } | |||
838 | imf->im6f_st[0] = imf->im6f_st[1]; | |||
839 | } | |||
840 | ||||
841 | /* | |||
842 | * Reap unreferenced sources from socket-layer filter set. | |||
843 | * | |||
844 | * Caller is expected to be holding im6o_lock. | |||
845 | */ | |||
846 | static void | |||
847 | im6f_reap(struct in6_mfilter *imf) | |||
848 | { | |||
849 | struct ip6_msource *ims, *tims; | |||
850 | struct in6_msource *lims; | |||
851 | ||||
852 | RB_FOREACH_SAFE(ims, ip6_msource_tree, &imf->im6f_sources, tims)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip6_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
853 | lims = (struct in6_msource *)ims; | |||
854 | if ((lims->im6sl_st[0] == MCAST_UNDEFINED0) && | |||
855 | (lims->im6sl_st[1] == MCAST_UNDEFINED0)) { | |||
856 | MLD_PRINTF(("%s: free in6ms 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
857 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
858 | RB_REMOVE(ip6_msource_tree, &imf->im6f_sources, ims)ip6_msource_tree_RB_REMOVE(&imf->im6f_sources, ims); | |||
859 | in6ms_free(lims); | |||
860 | imf->im6f_nsrc--; | |||
861 | } | |||
862 | } | |||
863 | } | |||
864 | ||||
865 | /* | |||
866 | * Purge socket-layer filter set. | |||
867 | * | |||
868 | * Caller is expected to be holding im6o_lock. | |||
869 | */ | |||
870 | void | |||
871 | im6f_purge(struct in6_mfilter *imf) | |||
872 | { | |||
873 | struct ip6_msource *ims, *tims; | |||
874 | struct in6_msource *lims; | |||
875 | ||||
876 | RB_FOREACH_SAFE(ims, ip6_msource_tree, &imf->im6f_sources, tims)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); ((ims) != ((void *)0)) && ((tims) = ip6_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
877 | lims = (struct in6_msource *)ims; | |||
878 | MLD_PRINTF(("%s: free in6ms 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0) | |||
879 | (uint64_t)VM_KERNEL_ADDRPERM(lims)))do { if (mld_debug) printf ("%s: free in6ms 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(lims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(lims) + vm_kernel_addrperm)); } while (0); | |||
880 | RB_REMOVE(ip6_msource_tree, &imf->im6f_sources, ims)ip6_msource_tree_RB_REMOVE(&imf->im6f_sources, ims); | |||
881 | in6ms_free(lims); | |||
882 | imf->im6f_nsrc--; | |||
883 | } | |||
884 | imf->im6f_st[0] = imf->im6f_st[1] = MCAST_UNDEFINED0; | |||
885 | VERIFY(RB_EMPTY(&imf->im6f_sources))((void)(__builtin_expect(!!((long)((((&imf->im6f_sources )->rbh_root == ((void *)0))))), 1L) || assfail("RB_EMPTY(&imf->im6f_sources)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 885 ))); | |||
886 | } | |||
887 | ||||
888 | /* | |||
889 | * Look up a source filter entry for a multicast group. | |||
890 | * | |||
891 | * inm is the group descriptor to work with. | |||
892 | * addr is the IPv6 address to look up. | |||
893 | * noalloc may be non-zero to suppress allocation of sources. | |||
894 | * *pims will be set to the address of the retrieved or allocated source. | |||
895 | * | |||
896 | * Return 0 if successful, otherwise return a non-zero error code. | |||
897 | */ | |||
898 | static int | |||
899 | in6m_get_source(struct in6_multi *inm, const struct in6_addr *addr, | |||
900 | const int noalloc, struct ip6_msource **pims) | |||
901 | { | |||
902 | struct ip6_msource find; | |||
903 | struct ip6_msource *ims, *nims; | |||
904 | ||||
905 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
906 | ||||
907 | find.im6s_addr = *addr; | |||
908 | ims = RB_FIND(ip6_msource_tree, &inm->in6m_srcs, &find)ip6_msource_tree_RB_FIND(&inm->in6m_srcs, &find); | |||
909 | if (ims == NULL((void *)0) && !noalloc) { | |||
910 | if (inm->in6m_nsrc == in6_mcast_maxgrpsrc) | |||
911 | return (ENOSPC28); | |||
912 | nims = ip6ms_alloc(M_WAITOK0x0000); | |||
913 | if (nims == NULL((void *)0)) | |||
914 | return (ENOMEM12); | |||
915 | nims->im6s_addr = *addr; | |||
916 | RB_INSERT(ip6_msource_tree, &inm->in6m_srcs, nims)ip6_msource_tree_RB_INSERT(&inm->in6m_srcs, nims); | |||
917 | ++inm->in6m_nsrc; | |||
918 | ims = nims; | |||
919 | MLD_PRINTF(("%s: allocated %s as 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: allocated %s as 0x%llx\n", __func__ , ip6_sprintf(addr), (uint64_t)(((vm_offset_t)(ims) == 0) ? ( vm_offset_t)(0) : (vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
920 | ip6_sprintf(addr), (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (mld_debug) printf ("%s: allocated %s as 0x%llx\n", __func__ , ip6_sprintf(addr), (uint64_t)(((vm_offset_t)(ims) == 0) ? ( vm_offset_t)(0) : (vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
921 | } | |||
922 | ||||
923 | *pims = ims; | |||
924 | return (0); | |||
925 | } | |||
926 | ||||
927 | /* | |||
928 | * Helper function to derive the filter mode on a source entry | |||
929 | * from its internal counters. Predicates are: | |||
930 | * A source is only excluded if all listeners exclude it. | |||
931 | * A source is only included if no listeners exclude it, | |||
932 | * and at least one listener includes it. | |||
933 | * May be used by ifmcstat(8). | |||
934 | */ | |||
935 | uint8_t | |||
936 | im6s_get_mode(const struct in6_multi *inm, const struct ip6_msource *ims, | |||
937 | uint8_t t) | |||
938 | { | |||
939 | IN6M_LOCK_ASSERT_HELD(__DECONST(struct in6_multi *, inm))lck_mtx_assert(&((struct in6_multi *) (long)(inm))->in6m_lock , 1); | |||
940 | ||||
941 | t = !!t; | |||
942 | if (inm->in6m_st[t].iss_ex > 0 && | |||
943 | inm->in6m_st[t].iss_ex == ims->im6s_st[t].ex) | |||
944 | return (MCAST_EXCLUDE2); | |||
945 | else if (ims->im6s_st[t].in > 0 && ims->im6s_st[t].ex == 0) | |||
946 | return (MCAST_INCLUDE1); | |||
947 | return (MCAST_UNDEFINED0); | |||
948 | } | |||
949 | ||||
950 | /* | |||
951 | * Merge socket-layer source into MLD-layer source. | |||
952 | * If rollback is non-zero, perform the inverse of the merge. | |||
953 | */ | |||
954 | static void | |||
955 | im6s_merge(struct ip6_msource *ims, const struct in6_msource *lims, | |||
956 | const int rollback) | |||
957 | { | |||
958 | int n = rollback ? -1 : 1; | |||
959 | ||||
960 | if (lims->im6sl_st[0] == MCAST_EXCLUDE2) { | |||
961 | MLD_PRINTF(("%s: t1 ex -= %d on %s\n", __func__, n,do { if (mld_debug) printf ("%s: t1 ex -= %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0) | |||
962 | ip6_sprintf(&lims->im6s_addr)))do { if (mld_debug) printf ("%s: t1 ex -= %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0); | |||
963 | ims->im6s_st[1].ex -= n; | |||
964 | } else if (lims->im6sl_st[0] == MCAST_INCLUDE1) { | |||
965 | MLD_PRINTF(("%s: t1 in -= %d on %s\n", __func__, n,do { if (mld_debug) printf ("%s: t1 in -= %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0) | |||
966 | ip6_sprintf(&lims->im6s_addr)))do { if (mld_debug) printf ("%s: t1 in -= %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0); | |||
967 | ims->im6s_st[1].in -= n; | |||
968 | } | |||
969 | ||||
970 | if (lims->im6sl_st[1] == MCAST_EXCLUDE2) { | |||
971 | MLD_PRINTF(("%s: t1 ex += %d on %s\n", __func__, n,do { if (mld_debug) printf ("%s: t1 ex += %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0) | |||
972 | ip6_sprintf(&lims->im6s_addr)))do { if (mld_debug) printf ("%s: t1 ex += %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0); | |||
973 | ims->im6s_st[1].ex += n; | |||
974 | } else if (lims->im6sl_st[1] == MCAST_INCLUDE1) { | |||
975 | MLD_PRINTF(("%s: t1 in += %d on %s\n", __func__, n,do { if (mld_debug) printf ("%s: t1 in += %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0) | |||
976 | ip6_sprintf(&lims->im6s_addr)))do { if (mld_debug) printf ("%s: t1 in += %d on %s\n", __func__ , n, ip6_sprintf(&lims->im6s_addr)); } while (0); | |||
977 | ims->im6s_st[1].in += n; | |||
978 | } | |||
979 | } | |||
980 | ||||
981 | /* | |||
982 | * Atomically update the global in6_multi state, when a membership's | |||
983 | * filter list is being updated in any way. | |||
984 | * | |||
985 | * imf is the per-inpcb-membership group filter pointer. | |||
986 | * A fake imf may be passed for in-kernel consumers. | |||
987 | * | |||
988 | * XXX This is a candidate for a set-symmetric-difference style loop | |||
989 | * which would eliminate the repeated lookup from root of ims nodes, | |||
990 | * as they share the same key space. | |||
991 | * | |||
992 | * If any error occurred this function will back out of refcounts | |||
993 | * and return a non-zero value. | |||
994 | */ | |||
995 | static int | |||
996 | in6m_merge(struct in6_multi *inm, /*const*/ struct in6_mfilter *imf) | |||
997 | { | |||
998 | struct ip6_msource *ims, *nims; | |||
999 | struct in6_msource *lims; | |||
1000 | int schanged, error; | |||
1001 | int nsrc0, nsrc1; | |||
1002 | ||||
1003 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
1004 | ||||
1005 | schanged = 0; | |||
1006 | error = 0; | |||
1007 | nsrc1 = nsrc0 = 0; | |||
1008 | ||||
1009 | /* | |||
1010 | * Update the source filters first, as this may fail. | |||
1011 | * Maintain count of in-mode filters at t0, t1. These are | |||
1012 | * used to work out if we transition into ASM mode or not. | |||
1013 | * Maintain a count of source filters whose state was | |||
1014 | * actually modified by this operation. | |||
1015 | */ | |||
1016 | RB_FOREACH(ims, ip6_msource_tree, &imf->im6f_sources)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
1017 | lims = (struct in6_msource *)ims; | |||
1018 | if (lims->im6sl_st[0] == imf->im6f_st[0]) nsrc0++; | |||
1019 | if (lims->im6sl_st[1] == imf->im6f_st[1]) nsrc1++; | |||
1020 | if (lims->im6sl_st[0] == lims->im6sl_st[1]) continue; | |||
1021 | error = in6m_get_source(inm, &lims->im6s_addr, 0, &nims); | |||
1022 | ++schanged; | |||
1023 | if (error) | |||
1024 | break; | |||
1025 | im6s_merge(nims, lims, 0); | |||
1026 | } | |||
1027 | if (error) { | |||
1028 | struct ip6_msource *bims; | |||
1029 | ||||
1030 | RB_FOREACH_REVERSE_FROM(ims, ip6_msource_tree, nims)for ((ims) = (nims); ((ims) != ((void *)0)) && ((nims ) = ip6_msource_tree_RB_PREV(ims), (ims) != ((void *)0)); (ims ) = (nims)) { | |||
1031 | lims = (struct in6_msource *)ims; | |||
1032 | if (lims->im6sl_st[0] == lims->im6sl_st[1]) | |||
1033 | continue; | |||
1034 | (void) in6m_get_source(inm, &lims->im6s_addr, 1, &bims); | |||
1035 | if (bims == NULL((void *)0)) | |||
1036 | continue; | |||
1037 | im6s_merge(bims, lims, 1); | |||
1038 | } | |||
1039 | goto out_reap; | |||
1040 | } | |||
1041 | ||||
1042 | MLD_PRINTF(("%s: imf filters in-mode: %d at t0, %d at t1\n",do { if (mld_debug) printf ("%s: imf filters in-mode: %d at t0, %d at t1\n" , __func__, nsrc0, nsrc1); } while (0) | |||
1043 | __func__, nsrc0, nsrc1))do { if (mld_debug) printf ("%s: imf filters in-mode: %d at t0, %d at t1\n" , __func__, nsrc0, nsrc1); } while (0); | |||
1044 | ||||
1045 | /* Handle transition between INCLUDE {n} and INCLUDE {} on socket. */ | |||
1046 | if (imf->im6f_st[0] == imf->im6f_st[1] && | |||
1047 | imf->im6f_st[1] == MCAST_INCLUDE1) { | |||
1048 | if (nsrc1 == 0) { | |||
1049 | MLD_PRINTF(("%s: --in on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: --in on inm at t1\n", __func__ ); } while (0); | |||
1050 | --inm->in6m_st[1].iss_in; | |||
1051 | } | |||
1052 | } | |||
1053 | ||||
1054 | /* Handle filter mode transition on socket. */ | |||
1055 | if (imf->im6f_st[0] != imf->im6f_st[1]) { | |||
1056 | MLD_PRINTF(("%s: imf transition %d to %d\n",do { if (mld_debug) printf ("%s: imf transition %d to %d\n", __func__ , imf->im6f_st[0], imf->im6f_st[1]); } while (0) | |||
1057 | __func__, imf->im6f_st[0], imf->im6f_st[1]))do { if (mld_debug) printf ("%s: imf transition %d to %d\n", __func__ , imf->im6f_st[0], imf->im6f_st[1]); } while (0); | |||
1058 | ||||
1059 | if (imf->im6f_st[0] == MCAST_EXCLUDE2) { | |||
1060 | MLD_PRINTF(("%s: --ex on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: --ex on inm at t1\n", __func__ ); } while (0); | |||
1061 | --inm->in6m_st[1].iss_ex; | |||
1062 | } else if (imf->im6f_st[0] == MCAST_INCLUDE1) { | |||
1063 | MLD_PRINTF(("%s: --in on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: --in on inm at t1\n", __func__ ); } while (0); | |||
1064 | --inm->in6m_st[1].iss_in; | |||
1065 | } | |||
1066 | ||||
1067 | if (imf->im6f_st[1] == MCAST_EXCLUDE2) { | |||
1068 | MLD_PRINTF(("%s: ex++ on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: ex++ on inm at t1\n", __func__ ); } while (0); | |||
1069 | inm->in6m_st[1].iss_ex++; | |||
1070 | } else if (imf->im6f_st[1] == MCAST_INCLUDE1 && nsrc1 > 0) { | |||
1071 | MLD_PRINTF(("%s: in++ on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: in++ on inm at t1\n", __func__ ); } while (0); | |||
1072 | inm->in6m_st[1].iss_in++; | |||
1073 | } | |||
1074 | } | |||
1075 | ||||
1076 | /* | |||
1077 | * Track inm filter state in terms of listener counts. | |||
1078 | * If there are any exclusive listeners, stack-wide | |||
1079 | * membership is exclusive. | |||
1080 | * Otherwise, if only inclusive listeners, stack-wide is inclusive. | |||
1081 | * If no listeners remain, state is undefined at t1, | |||
1082 | * and the MLD lifecycle for this group should finish. | |||
1083 | */ | |||
1084 | if (inm->in6m_st[1].iss_ex > 0) { | |||
1085 | MLD_PRINTF(("%s: transition to EX\n", __func__))do { if (mld_debug) printf ("%s: transition to EX\n", __func__ ); } while (0); | |||
1086 | inm->in6m_st[1].iss_fmode = MCAST_EXCLUDE2; | |||
1087 | } else if (inm->in6m_st[1].iss_in > 0) { | |||
1088 | MLD_PRINTF(("%s: transition to IN\n", __func__))do { if (mld_debug) printf ("%s: transition to IN\n", __func__ ); } while (0); | |||
1089 | inm->in6m_st[1].iss_fmode = MCAST_INCLUDE1; | |||
1090 | } else { | |||
1091 | MLD_PRINTF(("%s: transition to UNDEF\n", __func__))do { if (mld_debug) printf ("%s: transition to UNDEF\n", __func__ ); } while (0); | |||
1092 | inm->in6m_st[1].iss_fmode = MCAST_UNDEFINED0; | |||
1093 | } | |||
1094 | ||||
1095 | /* Decrement ASM listener count on transition out of ASM mode. */ | |||
1096 | if (imf->im6f_st[0] == MCAST_EXCLUDE2 && nsrc0 == 0) { | |||
1097 | if ((imf->im6f_st[1] != MCAST_EXCLUDE2) || | |||
1098 | (imf->im6f_st[1] == MCAST_EXCLUDE2 && nsrc1 > 0)) { | |||
1099 | MLD_PRINTF(("%s: --asm on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: --asm on inm at t1\n", __func__ ); } while (0); | |||
1100 | --inm->in6m_st[1].iss_asm; | |||
1101 | } | |||
1102 | } | |||
1103 | ||||
1104 | /* Increment ASM listener count on transition to ASM mode. */ | |||
1105 | if (imf->im6f_st[1] == MCAST_EXCLUDE2 && nsrc1 == 0) { | |||
1106 | MLD_PRINTF(("%s: asm++ on inm at t1\n", __func__))do { if (mld_debug) printf ("%s: asm++ on inm at t1\n", __func__ ); } while (0); | |||
1107 | inm->in6m_st[1].iss_asm++; | |||
1108 | } | |||
1109 | ||||
1110 | MLD_PRINTF(("%s: merged imf 0x%llx to inm 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0) | |||
1111 | (uint64_t)VM_KERNEL_ADDRPERM(imf),do { if (mld_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0) | |||
1112 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (mld_debug) printf ("%s: merged imf 0x%llx to inm 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(imf) + vm_kernel_addrperm), (uint64_t)(( (vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm ) + vm_kernel_addrperm)); } while (0); | |||
1113 | in6m_print(inm); | |||
1114 | ||||
1115 | out_reap: | |||
1116 | if (schanged > 0) { | |||
1117 | MLD_PRINTF(("%s: sources changed; reaping\n", __func__))do { if (mld_debug) printf ("%s: sources changed; reaping\n", __func__); } while (0); | |||
1118 | in6m_reap(inm); | |||
1119 | } | |||
1120 | return (error); | |||
1121 | } | |||
1122 | ||||
1123 | /* | |||
1124 | * Mark an in6_multi's filter set deltas as committed. | |||
1125 | * Called by MLD after a state change has been enqueued. | |||
1126 | */ | |||
1127 | void | |||
1128 | in6m_commit(struct in6_multi *inm) | |||
1129 | { | |||
1130 | struct ip6_msource *ims; | |||
1131 | ||||
1132 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
1133 | ||||
1134 | MLD_PRINTF(("%s: commit inm 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: commit inm 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0) | |||
1135 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (mld_debug) printf ("%s: commit inm 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0); | |||
1136 | MLD_PRINTF(("%s: pre commit:\n", __func__))do { if (mld_debug) printf ("%s: pre commit:\n", __func__); } while (0); | |||
1137 | in6m_print(inm); | |||
1138 | ||||
1139 | RB_FOREACH(ims, ip6_msource_tree, &inm->in6m_srcs)for ((ims) = ip6_msource_tree_RB_MINMAX(&inm->in6m_srcs , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
1140 | ims->im6s_st[0] = ims->im6s_st[1]; | |||
1141 | } | |||
1142 | inm->in6m_st[0] = inm->in6m_st[1]; | |||
1143 | } | |||
1144 | ||||
1145 | /* | |||
1146 | * Reap unreferenced nodes from an in6_multi's filter set. | |||
1147 | */ | |||
1148 | static void | |||
1149 | in6m_reap(struct in6_multi *inm) | |||
1150 | { | |||
1151 | struct ip6_msource *ims, *tims; | |||
1152 | ||||
1153 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
1154 | ||||
1155 | RB_FOREACH_SAFE(ims, ip6_msource_tree, &inm->in6m_srcs, tims)for ((ims) = ip6_msource_tree_RB_MINMAX(&inm->in6m_srcs , -1); ((ims) != ((void *)0)) && ((tims) = ip6_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
1156 | if (ims->im6s_st[0].ex > 0 || ims->im6s_st[0].in > 0 || | |||
1157 | ims->im6s_st[1].ex > 0 || ims->im6s_st[1].in > 0 || | |||
1158 | ims->im6s_stp != 0) | |||
1159 | continue; | |||
1160 | MLD_PRINTF(("%s: free ims 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
1161 | (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (mld_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
1162 | RB_REMOVE(ip6_msource_tree, &inm->in6m_srcs, ims)ip6_msource_tree_RB_REMOVE(&inm->in6m_srcs, ims); | |||
1163 | ip6ms_free(ims); | |||
1164 | inm->in6m_nsrc--; | |||
1165 | } | |||
1166 | } | |||
1167 | ||||
1168 | /* | |||
1169 | * Purge all source nodes from an in6_multi's filter set. | |||
1170 | */ | |||
1171 | void | |||
1172 | in6m_purge(struct in6_multi *inm) | |||
1173 | { | |||
1174 | struct ip6_msource *ims, *tims; | |||
1175 | ||||
1176 | IN6M_LOCK_ASSERT_HELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 1); | |||
1177 | ||||
1178 | RB_FOREACH_SAFE(ims, ip6_msource_tree, &inm->in6m_srcs, tims)for ((ims) = ip6_msource_tree_RB_MINMAX(&inm->in6m_srcs , -1); ((ims) != ((void *)0)) && ((tims) = ip6_msource_tree_RB_NEXT (ims), (ims) != ((void *)0)); (ims) = (tims)) { | |||
1179 | MLD_PRINTF(("%s: free ims 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
1180 | (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (mld_debug) printf ("%s: free ims 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
1181 | RB_REMOVE(ip6_msource_tree, &inm->in6m_srcs, ims)ip6_msource_tree_RB_REMOVE(&inm->in6m_srcs, ims); | |||
1182 | ip6ms_free(ims); | |||
1183 | inm->in6m_nsrc--; | |||
1184 | } | |||
1185 | } | |||
1186 | ||||
1187 | /* | |||
1188 | * Join a multicast address w/o sources. | |||
1189 | * KAME compatibility entry point. | |||
1190 | * | |||
1191 | */ | |||
1192 | struct in6_multi_mship * | |||
1193 | in6_joingroup(struct ifnet *ifp, struct in6_addr *mcaddr, | |||
1194 | int *errorp, int delay) | |||
1195 | { | |||
1196 | struct in6_multi_mship *imm; | |||
1197 | int error; | |||
1198 | ||||
1199 | *errorp = 0; | |||
1200 | ||||
1201 | imm = in6_multi_mship_alloc(M_WAITOK0x0000); | |||
1202 | if (imm == NULL((void *)0)) { | |||
1203 | *errorp = ENOBUFS55; | |||
1204 | return (NULL((void *)0)); | |||
1205 | } | |||
1206 | ||||
1207 | error = in6_mc_join(ifp, mcaddr, NULL((void *)0), &imm->i6mm_maddr, delay); | |||
1208 | if (error) { | |||
1209 | *errorp = error; | |||
1210 | in6_multi_mship_free(imm); | |||
1211 | return (NULL((void *)0)); | |||
1212 | } | |||
1213 | ||||
1214 | return (imm); | |||
1215 | } | |||
1216 | ||||
1217 | /* | |||
1218 | * Leave a multicast address w/o sources. | |||
1219 | * KAME compatibility entry point. | |||
1220 | */ | |||
1221 | int | |||
1222 | in6_leavegroup(struct in6_multi_mship *imm) | |||
1223 | { | |||
1224 | if (imm->i6mm_maddr != NULL((void *)0)) { | |||
1225 | in6_mc_leave(imm->i6mm_maddr, NULL((void *)0)); | |||
1226 | IN6M_REMREF(imm->i6mm_maddr)in6m_remref(imm->i6mm_maddr, 0); | |||
1227 | imm->i6mm_maddr = NULL((void *)0); | |||
1228 | } | |||
1229 | in6_multi_mship_free(imm); | |||
1230 | return 0; | |||
1231 | } | |||
1232 | ||||
1233 | /* | |||
1234 | * Join a multicast group; real entry point. | |||
1235 | * | |||
1236 | * Only preserves atomicity at inm level. | |||
1237 | * NOTE: imf argument cannot be const due to sys/tree.h limitations. | |||
1238 | * | |||
1239 | * If the MLD downcall fails, the group is not joined, and an error | |||
1240 | * code is returned. | |||
1241 | */ | |||
1242 | int | |||
1243 | in6_mc_join(struct ifnet *ifp, const struct in6_addr *mcaddr, | |||
1244 | /*const*/ struct in6_mfilter *imf, struct in6_multi **pinm, | |||
1245 | const int delay) | |||
1246 | { | |||
1247 | struct in6_mfilter timf; | |||
1248 | struct in6_multi *inm = NULL((void *)0); | |||
1249 | int error = 0; | |||
1250 | struct mld_tparams mtp; | |||
1251 | ||||
1252 | /* | |||
1253 | * Sanity: Check scope zone ID was set for ifp, if and | |||
1254 | * only if group is scoped to an interface. | |||
1255 | */ | |||
1256 | VERIFY(IN6_IS_ADDR_MULTICAST(mcaddr))((void)(__builtin_expect(!!((long)((((mcaddr)->__u6_addr.__u6_addr8 [0] == 0xff)))), 1L) || assfail("IN6_IS_ADDR_MULTICAST(mcaddr)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 1256 ))); | |||
1257 | if (IN6_IS_ADDR_MC_LINKLOCAL(mcaddr)(((mcaddr)->__u6_addr.__u6_addr8[0] == 0xff) && (( (mcaddr)->__u6_addr.__u6_addr8[1] & 0x0f) == 0x02)) || | |||
1258 | IN6_IS_ADDR_MC_INTFACELOCAL(mcaddr)(((mcaddr)->__u6_addr.__u6_addr8[0] == 0xff) && (( (mcaddr)->__u6_addr.__u6_addr8[1] & 0x0f) == 0x01))) { | |||
1259 | VERIFY(mcaddr->s6_addr16[1] != 0)((void)(__builtin_expect(!!((long)((mcaddr->__u6_addr.__u6_addr16 [1] != 0))), 1L) || assfail("mcaddr->s6_addr16[1] != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 1259))); | |||
1260 | } | |||
1261 | ||||
1262 | MLD_PRINTF(("%s: join %s on 0x%llx(%s))\n", __func__,do { if (mld_debug) printf ("%s: join %s on 0x%llx(%s))\n", __func__ , ip6_sprintf(mcaddr), (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm), ifp->if_xname); } while (0) | |||
1263 | ip6_sprintf(mcaddr), (uint64_t)VM_KERNEL_ADDRPERM(ifp),do { if (mld_debug) printf ("%s: join %s on 0x%llx(%s))\n", __func__ , ip6_sprintf(mcaddr), (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm), ifp->if_xname); } while (0) | |||
1264 | if_name(ifp)))do { if (mld_debug) printf ("%s: join %s on 0x%llx(%s))\n", __func__ , ip6_sprintf(mcaddr), (uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm), ifp->if_xname); } while (0); | |||
1265 | ||||
1266 | bzero(&mtp, sizeof (mtp)); | |||
1267 | *pinm = NULL((void *)0); | |||
1268 | ||||
1269 | /* | |||
1270 | * If no imf was specified (i.e. kernel consumer), | |||
1271 | * fake one up and assume it is an ASM join. | |||
1272 | */ | |||
1273 | if (imf == NULL((void *)0)) { | |||
1274 | im6f_init(&timf, MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
1275 | imf = &timf; | |||
1276 | } | |||
1277 | ||||
1278 | error = in6_mc_get(ifp, mcaddr, &inm); | |||
1279 | if (error) { | |||
1280 | MLD_PRINTF(("%s: in6_mc_get() failure\n", __func__))do { if (mld_debug) printf ("%s: in6_mc_get() failure\n", __func__ ); } while (0); | |||
1281 | return (error); | |||
1282 | } | |||
1283 | ||||
1284 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1285 | ||||
1286 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
1287 | error = in6m_merge(inm, imf); | |||
1288 | if (error) { | |||
1289 | MLD_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
1290 | goto out_in6m_release; | |||
1291 | } | |||
1292 | ||||
1293 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
1294 | error = mld_change_state(inm, &mtp, delay); | |||
1295 | if (error) { | |||
1296 | MLD_PRINTF(("%s: failed to update source\n", __func__))do { if (mld_debug) printf ("%s: failed to update source\n", __func__ ); } while (0); | |||
1297 | im6f_rollback(imf); | |||
1298 | goto out_in6m_release; | |||
1299 | } | |||
1300 | ||||
1301 | out_in6m_release: | |||
1302 | if (error) { | |||
1303 | MLD_PRINTF(("%s: dropping ref on 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: dropping ref on 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0) | |||
1304 | (uint64_t)VM_KERNEL_ADDRPERM(inm)))do { if (mld_debug) printf ("%s: dropping ref on 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm) + vm_kernel_addrperm)); } while (0); | |||
1305 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
1306 | IN6M_REMREF(inm)in6m_remref(inm, 0); | |||
1307 | } else { | |||
1308 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
1309 | *pinm = inm; /* keep refcount from in6_mc_get() */ | |||
1310 | } | |||
1311 | ||||
1312 | /* schedule timer now that we've dropped the lock(s) */ | |||
1313 | mld_set_timeout(&mtp); | |||
1314 | ||||
1315 | return (error); | |||
1316 | } | |||
1317 | ||||
1318 | /* | |||
1319 | * Leave a multicast group; real entry point. | |||
1320 | * All source filters will be expunged. | |||
1321 | * | |||
1322 | * Only preserves atomicity at inm level. | |||
1323 | * | |||
1324 | * Holding the write lock for the INP which contains imf | |||
1325 | * is highly advisable. We can't assert for it as imf does not | |||
1326 | * contain a back-pointer to the owning inp. | |||
1327 | * | |||
1328 | * Note: This is not the same as in6m_release(*) as this function also | |||
1329 | * makes a state change downcall into MLD. | |||
1330 | */ | |||
1331 | int | |||
1332 | in6_mc_leave(struct in6_multi *inm, /*const*/ struct in6_mfilter *imf) | |||
1333 | { | |||
1334 | struct in6_mfilter timf; | |||
1335 | int error, lastref; | |||
1336 | struct mld_tparams mtp; | |||
1337 | ||||
1338 | bzero(&mtp, sizeof (mtp)); | |||
1339 | error = 0; | |||
1340 | ||||
1341 | IN6M_LOCK_ASSERT_NOTHELD(inm)lck_mtx_assert(&(inm)->in6m_lock, 2); | |||
1342 | ||||
1343 | in6_multihead_lock_exclusive(); | |||
1344 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
1345 | ||||
1346 | MLD_PRINTF(("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(inm) + vm_kernel_addrperm), ip6_sprintf( &inm->in6m_addr), (in6m_is_ifp_detached(inm) ? "null" : inm->in6m_ifp->if_name), inm->in6m_ifp->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(imf) + vm_kernel_addrperm)); } while (0) | |||
1347 | (uint64_t)VM_KERNEL_ADDRPERM(inm), ip6_sprintf(&inm->in6m_addr),do { if (mld_debug) printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(inm) + vm_kernel_addrperm), ip6_sprintf( &inm->in6m_addr), (in6m_is_ifp_detached(inm) ? "null" : inm->in6m_ifp->if_name), inm->in6m_ifp->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(imf) + vm_kernel_addrperm)); } while (0) | |||
1348 | (in6m_is_ifp_detached(inm) ? "null" : inm->in6m_ifp->if_name),do { if (mld_debug) printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(inm) + vm_kernel_addrperm), ip6_sprintf( &inm->in6m_addr), (in6m_is_ifp_detached(inm) ? "null" : inm->in6m_ifp->if_name), inm->in6m_ifp->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(imf) + vm_kernel_addrperm)); } while (0) | |||
1349 | inm->in6m_ifp->if_unit, (uint64_t)VM_KERNEL_ADDRPERM(imf)))do { if (mld_debug) printf ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n" , __func__, (uint64_t)(((vm_offset_t)(inm) == 0) ? (vm_offset_t )(0) : (vm_offset_t)(inm) + vm_kernel_addrperm), ip6_sprintf( &inm->in6m_addr), (in6m_is_ifp_detached(inm) ? "null" : inm->in6m_ifp->if_name), inm->in6m_ifp->if_unit, (uint64_t)(((vm_offset_t)(imf) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(imf) + vm_kernel_addrperm)); } while (0); | |||
1350 | ||||
1351 | /* | |||
1352 | * If no imf was specified (i.e. kernel consumer), | |||
1353 | * fake one up and assume it is an ASM join. | |||
1354 | */ | |||
1355 | if (imf == NULL((void *)0)) { | |||
1356 | im6f_init(&timf, MCAST_EXCLUDE2, MCAST_UNDEFINED0); | |||
1357 | imf = &timf; | |||
1358 | } | |||
1359 | ||||
1360 | /* | |||
1361 | * Begin state merge transaction at MLD layer. | |||
1362 | * | |||
1363 | * As this particular invocation should not cause any memory | |||
1364 | * to be allocated, and there is no opportunity to roll back | |||
1365 | * the transaction, it MUST NOT fail. | |||
1366 | */ | |||
1367 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1368 | ||||
1369 | error = in6m_merge(inm, imf); | |||
1370 | KASSERT(error == 0, ("%s: failed to merge inm state\n", __func__)); | |||
1371 | ||||
1372 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
1373 | error = mld_change_state(inm, &mtp, 0); | |||
1374 | #if MLD_DEBUG1 | |||
1375 | if (error) | |||
1376 | MLD_PRINTF(("%s: failed mld downcall\n", __func__))do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0); | |||
1377 | #endif | |||
1378 | lastref = in6_multi_detach(inm); | |||
1379 | VERIFY(!lastref || (!(inm->in6m_debug & IFD_ATTACHED) &&((void)(__builtin_expect(!!((long)((!lastref || (!(inm->in6m_debug & 0x1) && inm->in6m_reqcnt == 0)))), 1L) || assfail ("!lastref || (!(inm->in6m_debug & IFD_ATTACHED) && inm->in6m_reqcnt == 0)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 1380 ))) | |||
1380 | inm->in6m_reqcnt == 0))((void)(__builtin_expect(!!((long)((!lastref || (!(inm->in6m_debug & 0x1) && inm->in6m_reqcnt == 0)))), 1L) || assfail ("!lastref || (!(inm->in6m_debug & IFD_ATTACHED) && inm->in6m_reqcnt == 0)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 1380 ))); | |||
1381 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
1382 | in6_multihead_lock_done(); | |||
1383 | ||||
1384 | if (lastref) | |||
1385 | IN6M_REMREF(inm)in6m_remref(inm, 0); /* for in6_multihead list */ | |||
1386 | ||||
1387 | /* schedule timer now that we've dropped the lock(s) */ | |||
1388 | mld_set_timeout(&mtp); | |||
1389 | ||||
1390 | return (error); | |||
1391 | } | |||
1392 | ||||
1393 | /* | |||
1394 | * Block or unblock an ASM multicast source on an inpcb. | |||
1395 | * This implements the delta-based API described in RFC 3678. | |||
1396 | * | |||
1397 | * The delta-based API applies only to exclusive-mode memberships. | |||
1398 | * An MLD downcall will be performed. | |||
1399 | * | |||
1400 | * Return 0 if successful, otherwise return an appropriate error code. | |||
1401 | */ | |||
1402 | static int | |||
1403 | in6p_block_unblock_source(struct inpcb *inp, struct sockopt *sopt) | |||
1404 | { | |||
1405 | struct group_source_req gsr; | |||
1406 | sockunion_t *gsa, *ssa; | |||
1407 | struct ifnet *ifp; | |||
1408 | struct in6_mfilter *imf; | |||
1409 | struct ip6_moptions *imo; | |||
1410 | struct in6_msource *ims; | |||
1411 | struct in6_multi *inm; | |||
1412 | size_t idx; | |||
1413 | uint16_t fmode; | |||
1414 | int error, doblock; | |||
1415 | struct mld_tparams mtp; | |||
1416 | ||||
1417 | bzero(&mtp, sizeof (mtp)); | |||
1418 | ifp = NULL((void *)0); | |||
1419 | error = 0; | |||
1420 | doblock = 0; | |||
1421 | ||||
1422 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
1423 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
1424 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
1425 | ||||
1426 | switch (sopt->sopt_name) { | |||
1427 | case MCAST_BLOCK_SOURCE84: | |||
1428 | case MCAST_UNBLOCK_SOURCE85: | |||
1429 | error = sooptcopyin(sopt, &gsr, | |||
1430 | sizeof(struct group_source_req), | |||
1431 | sizeof(struct group_source_req)); | |||
1432 | if (error) | |||
1433 | return (error); | |||
1434 | ||||
1435 | if (gsa->sin6.sin6_family != AF_INET630 || | |||
1436 | gsa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
1437 | return (EINVAL22); | |||
1438 | ||||
1439 | if (ssa->sin6.sin6_family != AF_INET630 || | |||
1440 | ssa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
1441 | return (EINVAL22); | |||
1442 | ||||
1443 | ifnet_head_lock_shared(); | |||
1444 | if (gsr.gsr_interface == 0 || | |||
1445 | (u_int)if_index < gsr.gsr_interface) { | |||
1446 | ifnet_head_done(); | |||
1447 | return (EADDRNOTAVAIL49); | |||
1448 | } | |||
1449 | ||||
1450 | ifp = ifindex2ifnet[gsr.gsr_interface]; | |||
1451 | ifnet_head_done(); | |||
1452 | ||||
1453 | if (ifp == NULL((void *)0)) | |||
1454 | return (EADDRNOTAVAIL49); | |||
1455 | ||||
1456 | if (sopt->sopt_name == MCAST_BLOCK_SOURCE84) | |||
1457 | doblock = 1; | |||
1458 | break; | |||
1459 | ||||
1460 | default: | |||
1461 | MLD_PRINTF(("%s: unknown sopt_name %d\n",do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
1462 | __func__, sopt->sopt_name))do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
1463 | return (EOPNOTSUPP102); | |||
1464 | } | |||
1465 | ||||
1466 | if (!IN6_IS_ADDR_MULTICAST(&gsa->sin6.sin6_addr)((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
1467 | return (EINVAL22); | |||
1468 | ||||
1469 | (void) in6_setscope(&gsa->sin6.sin6_addr, ifp, NULL((void *)0)); | |||
1470 | ||||
1471 | /* | |||
1472 | * Check if we are actually a member of this group. | |||
1473 | */ | |||
1474 | imo = in6p_findmoptions(inp); | |||
1475 | if (imo == NULL((void *)0)) | |||
1476 | return (ENOMEM12); | |||
1477 | ||||
1478 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
1479 | idx = im6o_match_group(imo, ifp, &gsa->sa); | |||
1480 | if (idx == (size_t)-1 || imo->im6o_mfilters == NULL((void *)0)) { | |||
1481 | error = EADDRNOTAVAIL49; | |||
1482 | goto out_imo_locked; | |||
1483 | } | |||
1484 | ||||
1485 | VERIFY(imo->im6o_mfilters != NULL)((void)(__builtin_expect(!!((long)((imo->im6o_mfilters != ( (void *)0)))), 1L) || assfail("imo->im6o_mfilters != NULL" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 1485 ))); | |||
1486 | imf = &imo->im6o_mfilters[idx]; | |||
1487 | inm = imo->im6o_membership[idx]; | |||
1488 | ||||
1489 | /* | |||
1490 | * Attempting to use the delta-based API on an | |||
1491 | * non exclusive-mode membership is an error. | |||
1492 | */ | |||
1493 | fmode = imf->im6f_st[0]; | |||
1494 | if (fmode != MCAST_EXCLUDE2) { | |||
1495 | error = EINVAL22; | |||
1496 | goto out_imo_locked; | |||
1497 | } | |||
1498 | ||||
1499 | /* | |||
1500 | * Deal with error cases up-front: | |||
1501 | * Asked to block, but already blocked; or | |||
1502 | * Asked to unblock, but nothing to unblock. | |||
1503 | * If adding a new block entry, allocate it. | |||
1504 | */ | |||
1505 | ims = im6o_match_source(imo, idx, &ssa->sa); | |||
1506 | if ((ims != NULL((void *)0) && doblock) || (ims == NULL((void *)0) && !doblock)) { | |||
1507 | MLD_PRINTF(("%s: source %s %spresent\n", __func__,do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), doblock ? "" : "not " ); } while (0) | |||
1508 | ip6_sprintf(&ssa->sin6.sin6_addr),do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), doblock ? "" : "not " ); } while (0) | |||
1509 | doblock ? "" : "not "))do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), doblock ? "" : "not " ); } while (0); | |||
1510 | error = EADDRNOTAVAIL49; | |||
1511 | goto out_imo_locked; | |||
1512 | } | |||
1513 | ||||
1514 | /* | |||
1515 | * Begin state merge transaction at socket layer. | |||
1516 | */ | |||
1517 | if (doblock) { | |||
1518 | MLD_PRINTF(("%s: %s source\n", __func__, "block"))do { if (mld_debug) printf ("%s: %s source\n", __func__, "block" ); } while (0); | |||
1519 | ims = im6f_graft(imf, fmode, &ssa->sin6); | |||
1520 | if (ims == NULL((void *)0)) | |||
1521 | error = ENOMEM12; | |||
1522 | } else { | |||
1523 | MLD_PRINTF(("%s: %s source\n", __func__, "allow"))do { if (mld_debug) printf ("%s: %s source\n", __func__, "allow" ); } while (0); | |||
1524 | error = im6f_prune(imf, &ssa->sin6); | |||
1525 | } | |||
1526 | ||||
1527 | if (error) { | |||
1528 | MLD_PRINTF(("%s: merge imf state failed\n", __func__))do { if (mld_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
1529 | goto out_im6f_rollback; | |||
1530 | } | |||
1531 | ||||
1532 | /* | |||
1533 | * Begin state merge transaction at MLD layer. | |||
1534 | */ | |||
1535 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
1536 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
1537 | error = in6m_merge(inm, imf); | |||
1538 | if (error) { | |||
1539 | MLD_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
1540 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
1541 | goto out_im6f_rollback; | |||
1542 | } | |||
1543 | ||||
1544 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
1545 | error = mld_change_state(inm, &mtp, 0); | |||
1546 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
1547 | #if MLD_DEBUG1 | |||
1548 | if (error) | |||
1549 | MLD_PRINTF(("%s: failed mld downcall\n", __func__))do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0); | |||
1550 | #endif | |||
1551 | ||||
1552 | out_im6f_rollback: | |||
1553 | if (error) | |||
1554 | im6f_rollback(imf); | |||
1555 | else | |||
1556 | im6f_commit(imf); | |||
1557 | ||||
1558 | im6f_reap(imf); | |||
1559 | ||||
1560 | out_imo_locked: | |||
1561 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
1562 | IM6O_REMREF(imo)im6o_remref(imo); /* from in6p_findmoptions() */ | |||
1563 | ||||
1564 | /* schedule timer now that we've dropped the lock(s) */ | |||
1565 | mld_set_timeout(&mtp); | |||
1566 | ||||
1567 | return (error); | |||
1568 | } | |||
1569 | ||||
1570 | /* | |||
1571 | * Given an inpcb, return its multicast options structure pointer. Accepts | |||
1572 | * an unlocked inpcb pointer, but will return it locked. May sleep. | |||
1573 | * | |||
1574 | */ | |||
1575 | static struct ip6_moptions * | |||
1576 | in6p_findmoptions(struct inpcb *inp) | |||
1577 | { | |||
1578 | struct ip6_moptions *imo; | |||
1579 | struct in6_multi **immp; | |||
1580 | struct in6_mfilter *imfp; | |||
1581 | size_t idx; | |||
1582 | ||||
1583 | if ((imo = inp->in6p_moptionsinp_depend6.inp6_moptions) != NULL((void *)0)) { | |||
1584 | IM6O_ADDREF(imo)im6o_addref(imo, 0); /* for caller */ | |||
1585 | return (imo); | |||
1586 | } | |||
1587 | ||||
1588 | imo = ip6_allocmoptions(M_WAITOK0x0000); | |||
1589 | if (imo == NULL((void *)0)) | |||
1590 | return (NULL((void *)0)); | |||
1591 | ||||
1592 | immp = _MALLOC(sizeof (*immp) * IPV6_MIN_MEMBERSHIPS, M_IP6MOPTS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (*immp) * 31, 113, 0x0000 | 0x0004, & site); }) | |||
1593 | M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (*immp) * 31, 113, 0x0000 | 0x0004, & site); }); | |||
1594 | if (immp == NULL((void *)0)) { | |||
1595 | IM6O_REMREF(imo)im6o_remref(imo); | |||
1596 | return (NULL((void *)0)); | |||
1597 | } | |||
1598 | ||||
1599 | imfp = _MALLOC(sizeof (struct in6_mfilter) * IPV6_MIN_MEMBERSHIPS,({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (struct in6_mfilter) * 31, 112, 0x0000 | 0x0004, &site); }) | |||
1600 | M_IN6MFILTER, M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC(sizeof (struct in6_mfilter) * 31, 112, 0x0000 | 0x0004, &site); }); | |||
1601 | if (imfp == NULL((void *)0)) { | |||
1602 | _FREE(immp, M_IP6MOPTS113); | |||
1603 | IM6O_REMREF(imo)im6o_remref(imo); | |||
1604 | return (NULL((void *)0)); | |||
1605 | } | |||
1606 | ||||
1607 | imo->im6o_multicast_ifp = NULL((void *)0); | |||
1608 | imo->im6o_multicast_hlim = ip6_defmcasthlim; | |||
1609 | imo->im6o_multicast_loop = in6_mcast_loop; | |||
1610 | imo->im6o_num_memberships = 0; | |||
1611 | imo->im6o_max_memberships = IPV6_MIN_MEMBERSHIPS31; | |||
1612 | imo->im6o_membership = immp; | |||
1613 | ||||
1614 | /* Initialize per-group source filters. */ | |||
1615 | for (idx = 0; idx < IPV6_MIN_MEMBERSHIPS31; idx++) | |||
1616 | im6f_init(&imfp[idx], MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
1617 | ||||
1618 | imo->im6o_mfilters = imfp; | |||
1619 | inp->in6p_moptionsinp_depend6.inp6_moptions = imo; /* keep reference from ip6_allocmoptions() */ | |||
1620 | IM6O_ADDREF(imo)im6o_addref(imo, 0); /* for caller */ | |||
1621 | ||||
1622 | return (imo); | |||
1623 | } | |||
1624 | ||||
1625 | /* | |||
1626 | * Atomically get source filters on a socket for an IPv6 multicast group. | |||
1627 | * Called with INP lock held; returns with lock released. | |||
1628 | */ | |||
1629 | static int | |||
1630 | in6p_get_source_filters(struct inpcb *inp, struct sockopt *sopt) | |||
1631 | { | |||
1632 | struct __msfilterreq64 msfr, msfr64; | |||
1633 | struct __msfilterreq32 msfr32; | |||
1634 | sockunion_t *gsa; | |||
1635 | struct ifnet *ifp; | |||
1636 | struct ip6_moptions *imo; | |||
1637 | struct in6_mfilter *imf; | |||
1638 | struct ip6_msource *ims; | |||
1639 | struct in6_msource *lims; | |||
1640 | struct sockaddr_in6 *psin; | |||
1641 | struct sockaddr_storage *ptss; | |||
1642 | struct sockaddr_storage *tss; | |||
1643 | int error; | |||
1644 | size_t idx, nsrcs, ncsrcs; | |||
1645 | user_addr_t tmp_ptr; | |||
1646 | ||||
1647 | imo = inp->in6p_moptionsinp_depend6.inp6_moptions; | |||
1648 | VERIFY(imo != NULL)((void)(__builtin_expect(!!((long)((imo != ((void *)0)))), 1L ) || assfail("imo != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 1648))); | |||
1649 | ||||
1650 | if (IS_64BIT_PROCESS(current_proc())) { | |||
| ||||
1651 | error = sooptcopyin(sopt, &msfr64, | |||
1652 | sizeof(struct __msfilterreq64), | |||
1653 | sizeof(struct __msfilterreq64)); | |||
1654 | if (error) | |||
1655 | return (error); | |||
1656 | /* we never use msfr.msfr_srcs; */ | |||
1657 | memcpy(&msfr, &msfr64, sizeof(msfr64)); | |||
1658 | } else { | |||
1659 | error = sooptcopyin(sopt, &msfr32, | |||
1660 | sizeof(struct __msfilterreq32), | |||
1661 | sizeof(struct __msfilterreq32)); | |||
1662 | if (error) | |||
1663 | return (error); | |||
1664 | /* we never use msfr.msfr_srcs; */ | |||
1665 | memcpy(&msfr, &msfr32, sizeof(msfr32)); | |||
1666 | } | |||
1667 | ||||
1668 | if (msfr.msfr_group.ss_family != AF_INET630 || | |||
1669 | msfr.msfr_group.ss_len != sizeof(struct sockaddr_in6)) | |||
1670 | return (EINVAL22); | |||
1671 | ||||
1672 | gsa = (sockunion_t *)&msfr.msfr_group; | |||
1673 | if (!IN6_IS_ADDR_MULTICAST(&gsa->sin6.sin6_addr)((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
1674 | return (EINVAL22); | |||
1675 | ||||
1676 | ifnet_head_lock_shared(); | |||
1677 | if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) { | |||
1678 | ifnet_head_done(); | |||
1679 | return (EADDRNOTAVAIL49); | |||
1680 | } | |||
1681 | ifp = ifindex2ifnet[msfr.msfr_ifindex]; | |||
1682 | ifnet_head_done(); | |||
1683 | ||||
1684 | if (ifp == NULL((void *)0)) | |||
1685 | return (EADDRNOTAVAIL49); | |||
1686 | ||||
1687 | if ((size_t) msfr.msfr_nsrcs > | |||
1688 | UINT32_MAX4294967295U / sizeof(struct sockaddr_storage)) | |||
1689 | msfr.msfr_nsrcs = UINT32_MAX4294967295U / sizeof(struct sockaddr_storage); | |||
1690 | ||||
1691 | if (msfr.msfr_nsrcs > in6_mcast_maxsocksrc) | |||
1692 | msfr.msfr_nsrcs = in6_mcast_maxsocksrc; | |||
1693 | ||||
1694 | (void)in6_setscope(&gsa->sin6.sin6_addr, ifp, NULL((void *)0)); | |||
1695 | ||||
1696 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
1697 | /* | |||
1698 | * Lookup group on the socket. | |||
1699 | */ | |||
1700 | idx = im6o_match_group(imo, ifp, &gsa->sa); | |||
1701 | if (idx == (size_t)-1 || imo->im6o_mfilters == NULL((void *)0)) { | |||
1702 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
1703 | return (EADDRNOTAVAIL49); | |||
1704 | } | |||
1705 | imf = &imo->im6o_mfilters[idx]; | |||
1706 | ||||
1707 | /* | |||
1708 | * Ignore memberships which are in limbo. | |||
1709 | */ | |||
1710 | if (imf->im6f_st[1] == MCAST_UNDEFINED0) { | |||
1711 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
1712 | return (EAGAIN35); | |||
1713 | } | |||
1714 | msfr.msfr_fmode = imf->im6f_st[1]; | |||
1715 | ||||
1716 | /* | |||
1717 | * If the user specified a buffer, copy out the source filter | |||
1718 | * entries to userland gracefully. | |||
1719 | * We only copy out the number of entries which userland | |||
1720 | * has asked for, but we always tell userland how big the | |||
1721 | * buffer really needs to be. | |||
1722 | */ | |||
1723 | tss = NULL((void *)0); | |||
1724 | ||||
1725 | if (IS_64BIT_PROCESS(current_proc())) | |||
1726 | tmp_ptr = msfr64.msfr_srcs; | |||
1727 | else | |||
1728 | tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs)((user_addr_t)((uintptr_t)(msfr32.msfr_srcs))); | |||
1729 | ||||
1730 | if (tmp_ptr != USER_ADDR_NULL((user_addr_t) 0) && msfr.msfr_nsrcs > 0) { | |||
1731 | tss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss),({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss), 80, 0x0000 | 0x0004, &site); }) | |||
1732 | M_TEMP, M_WAITOK | M_ZERO)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss), 80, 0x0000 | 0x0004, &site); }); | |||
1733 | if (tss == NULL((void *)0)) { | |||
1734 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
1735 | return (ENOBUFS55); | |||
1736 | } | |||
1737 | } | |||
1738 | ||||
1739 | /* | |||
1740 | * Count number of sources in-mode at t0. | |||
1741 | * If buffer space exists and remains, copy out source entries. | |||
1742 | */ | |||
1743 | nsrcs = msfr.msfr_nsrcs; | |||
1744 | ncsrcs = 0; | |||
1745 | ptss = tss; | |||
1746 | RB_FOREACH(ims, ip6_msource_tree, &imf->im6f_sources)for ((ims) = ip6_msource_tree_RB_MINMAX(&imf->im6f_sources , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
1747 | lims = (struct in6_msource *)ims; | |||
1748 | if (lims->im6sl_st[0] == MCAST_UNDEFINED0 || | |||
1749 | lims->im6sl_st[0] != imf->im6f_st[0]) | |||
1750 | continue; | |||
1751 | if (tss != NULL((void *)0) && nsrcs > 0) { | |||
1752 | psin = (struct sockaddr_in6 *)ptss; | |||
1753 | psin->sin6_family = AF_INET630; | |||
1754 | psin->sin6_len = sizeof(struct sockaddr_in6); | |||
1755 | psin->sin6_addr = lims->im6s_addr; | |||
1756 | psin->sin6_port = 0; | |||
1757 | --nsrcs; | |||
1758 | ++ptss; | |||
1759 | ++ncsrcs; | |||
1760 | } | |||
1761 | } | |||
1762 | ||||
1763 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
1764 | ||||
1765 | if (tss != NULL((void *)0)) { | |||
1766 | error = copyout(tss, tmp_ptr, ncsrcs * sizeof(*tss)); | |||
1767 | FREE(tss, M_TEMP)_FREE((void *)tss, 80); | |||
1768 | if (error) | |||
1769 | return (error); | |||
1770 | } | |||
1771 | ||||
1772 | msfr.msfr_nsrcs = ncsrcs; | |||
1773 | if (IS_64BIT_PROCESS(current_proc())) { | |||
1774 | msfr64.msfr_ifindex = msfr.msfr_ifindex; | |||
1775 | msfr64.msfr_fmode = msfr.msfr_fmode; | |||
1776 | msfr64.msfr_nsrcs = msfr.msfr_nsrcs; | |||
1777 | memcpy(&msfr64.msfr_group, &msfr.msfr_group, | |||
1778 | sizeof(struct sockaddr_storage)); | |||
1779 | error = sooptcopyout(sopt, &msfr64, | |||
| ||||
1780 | sizeof(struct __msfilterreq64)); | |||
1781 | } else { | |||
1782 | msfr32.msfr_ifindex = msfr.msfr_ifindex; | |||
1783 | msfr32.msfr_fmode = msfr.msfr_fmode; | |||
1784 | msfr32.msfr_nsrcs = msfr.msfr_nsrcs; | |||
1785 | memcpy(&msfr32.msfr_group, &msfr.msfr_group, | |||
1786 | sizeof(struct sockaddr_storage)); | |||
1787 | error = sooptcopyout(sopt, &msfr32, | |||
1788 | sizeof(struct __msfilterreq32)); | |||
1789 | } | |||
1790 | ||||
1791 | return (error); | |||
1792 | } | |||
1793 | ||||
1794 | /* | |||
1795 | * Return the IP multicast options in response to user getsockopt(). | |||
1796 | */ | |||
1797 | int | |||
1798 | ip6_getmoptions(struct inpcb *inp, struct sockopt *sopt) | |||
1799 | { | |||
1800 | struct ip6_moptions *im6o; | |||
1801 | int error; | |||
1802 | u_int optval; | |||
1803 | ||||
1804 | im6o = inp->in6p_moptionsinp_depend6.inp6_moptions; | |||
1805 | /* | |||
1806 | * If socket is neither of type SOCK_RAW or SOCK_DGRAM, | |||
1807 | * or is a divert socket, reject it. | |||
1808 | */ | |||
1809 | if (SOCK_PROTO(inp->inp_socket)((inp->inp_socket)->so_proto->pr_protocol) == IPPROTO_DIVERT254 || | |||
1810 | (SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_RAW3 && | |||
1811 | SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_DGRAM2)) { | |||
1812 | return (EOPNOTSUPP102); | |||
1813 | } | |||
1814 | ||||
1815 | error = 0; | |||
1816 | switch (sopt->sopt_name) { | |||
1817 | case IPV6_MULTICAST_IF9: | |||
1818 | if (im6o != NULL((void *)0)) | |||
1819 | IM6O_LOCK(im6o)lck_mtx_lock(&(im6o)->im6o_lock); | |||
1820 | if (im6o == NULL((void *)0) || im6o->im6o_multicast_ifp == NULL((void *)0)) { | |||
1821 | optval = 0; | |||
1822 | } else { | |||
1823 | optval = im6o->im6o_multicast_ifp->if_index; | |||
1824 | } | |||
1825 | if (im6o != NULL((void *)0)) | |||
1826 | IM6O_UNLOCK(im6o)lck_mtx_unlock(&(im6o)->im6o_lock); | |||
1827 | error = sooptcopyout(sopt, &optval, sizeof(u_int)); | |||
1828 | break; | |||
1829 | ||||
1830 | case IPV6_MULTICAST_HOPS10: | |||
1831 | if (im6o == NULL((void *)0)) { | |||
1832 | optval = ip6_defmcasthlim; | |||
1833 | } else { | |||
1834 | IM6O_LOCK(im6o)lck_mtx_lock(&(im6o)->im6o_lock); | |||
1835 | optval = im6o->im6o_multicast_hlim; | |||
1836 | IM6O_UNLOCK(im6o)lck_mtx_unlock(&(im6o)->im6o_lock); | |||
1837 | } | |||
1838 | error = sooptcopyout(sopt, &optval, sizeof(u_int)); | |||
1839 | break; | |||
1840 | ||||
1841 | case IPV6_MULTICAST_LOOP11: | |||
1842 | if (im6o == NULL((void *)0)) { | |||
1843 | optval = in6_mcast_loop; /* XXX VIMAGE */ | |||
1844 | } else { | |||
1845 | IM6O_LOCK(im6o)lck_mtx_lock(&(im6o)->im6o_lock); | |||
1846 | optval = im6o->im6o_multicast_loop; | |||
1847 | IM6O_UNLOCK(im6o)lck_mtx_unlock(&(im6o)->im6o_lock); | |||
1848 | } | |||
1849 | error = sooptcopyout(sopt, &optval, sizeof(u_int)); | |||
1850 | break; | |||
1851 | ||||
1852 | case IPV6_MSFILTER74: | |||
1853 | if (im6o == NULL((void *)0)) { | |||
1854 | error = EADDRNOTAVAIL49; | |||
1855 | } else { | |||
1856 | error = in6p_get_source_filters(inp, sopt); | |||
1857 | } | |||
1858 | break; | |||
1859 | ||||
1860 | default: | |||
1861 | error = ENOPROTOOPT42; | |||
1862 | break; | |||
1863 | } | |||
1864 | ||||
1865 | return (error); | |||
1866 | } | |||
1867 | ||||
1868 | /* | |||
1869 | * Look up the ifnet to use for a multicast group membership, | |||
1870 | * given the address of an IPv6 group. | |||
1871 | * | |||
1872 | * This routine exists to support legacy IPv6 multicast applications. | |||
1873 | * | |||
1874 | * If inp is non-NULL and is bound to an interface, use this socket's | |||
1875 | * inp_boundif for any required routing table lookup. | |||
1876 | * | |||
1877 | * If the route lookup fails, return NULL. | |||
1878 | * | |||
1879 | * FUTURE: Support multiple forwarding tables for IPv6. | |||
1880 | * | |||
1881 | * Returns NULL if no ifp could be found. | |||
1882 | */ | |||
1883 | static struct ifnet * | |||
1884 | in6p_lookup_mcast_ifp(const struct inpcb *in6p, | |||
1885 | const struct sockaddr_in6 *gsin6) | |||
1886 | { | |||
1887 | struct route_in6 ro6; | |||
1888 | struct ifnet *ifp; | |||
1889 | unsigned int ifscope = IFSCOPE_NONE0; | |||
1890 | ||||
1891 | VERIFY(in6p == NULL || (in6p->inp_vflag & INP_IPV6))((void)(__builtin_expect(!!((long)((in6p == ((void *)0) || (in6p ->inp_vflag & 0x2)))), 1L) || assfail("in6p == NULL || (in6p->inp_vflag & INP_IPV6)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 1891 ))); | |||
1892 | VERIFY(gsin6->sin6_family == AF_INET6)((void)(__builtin_expect(!!((long)((gsin6->sin6_family == 30 ))), 1L) || assfail("gsin6->sin6_family == AF_INET6", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 1892))); | |||
1893 | if (IN6_IS_ADDR_MULTICAST(&gsin6->sin6_addr)((&gsin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff ) == 0) | |||
1894 | return NULL((void *)0); | |||
1895 | ||||
1896 | if (in6p != NULL((void *)0) && (in6p->inp_flags & INP_BOUND_IF0x00004000)) | |||
1897 | ifscope = in6p->inp_boundifp->if_index; | |||
1898 | ||||
1899 | ifp = NULL((void *)0); | |||
1900 | memset(&ro6, 0, sizeof(struct route_in6)); | |||
1901 | memcpy(&ro6.ro_dst, gsin6, sizeof(struct sockaddr_in6)); | |||
1902 | rtalloc_scoped_ign((struct route *)&ro6, 0, ifscope); | |||
1903 | if (ro6.ro_rt != NULL((void *)0)) { | |||
1904 | ifp = ro6.ro_rt->rt_ifp; | |||
1905 | VERIFY(ifp != NULL)((void)(__builtin_expect(!!((long)((ifp != ((void *)0)))), 1L ) || assfail("ifp != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 1905))); | |||
1906 | } | |||
1907 | ROUTE_RELEASE(&ro6)do { if ((&ro6)->ro_rt != ((void *)0)) { lck_mtx_assert (&((&ro6)->ro_rt)->rt_lock, 2); if (0) rtfree_locked ((&ro6)->ro_rt); else rtfree((&ro6)->ro_rt); (& ro6)->ro_rt = ((void *)0); } if ((&ro6)->ro_srcia != ((void *)0)) { do { (void) ifa_remref((&ro6)->ro_srcia , 0); } while (0); (&ro6)->ro_srcia = ((void *)0); (& ro6)->ro_flags &= ~0x1; } } while (0); | |||
1908 | ||||
1909 | return (ifp); | |||
1910 | } | |||
1911 | ||||
1912 | /* | |||
1913 | * Since ipv6_mreq contains an ifindex and ip_mreq contains an AF_INET | |||
1914 | * address, we need to lookup the AF_INET address when translating an | |||
1915 | * ipv6_mreq structure into an ipmreq structure. | |||
1916 | * This is used when userland performs multicast setsockopt() on AF_INET6 | |||
1917 | * sockets with AF_INET multicast addresses (IPv6 v4 mapped addresses). | |||
1918 | */ | |||
1919 | static int | |||
1920 | in6p_lookup_v4addr(struct ipv6_mreq *mreq, struct ip_mreq *v4mreq) | |||
1921 | { | |||
1922 | struct ifnet *ifp; | |||
1923 | struct ifaddr *ifa; | |||
1924 | struct sockaddr_in *sin; | |||
1925 | ||||
1926 | ifnet_head_lock_shared(); | |||
1927 | if (mreq->ipv6mr_interface > (unsigned int)if_index) { | |||
1928 | ifnet_head_done(); | |||
1929 | return (EADDRNOTAVAIL49); | |||
1930 | } else | |||
1931 | ifp = ifindex2ifnet[mreq->ipv6mr_interface]; | |||
1932 | ifnet_head_done(); | |||
1933 | if (ifp == NULL((void *)0)) | |||
1934 | return (EADDRNOTAVAIL49); | |||
1935 | ifa = ifa_ifpgetprimary(ifp, AF_INET2); | |||
1936 | if (ifa == NULL((void *)0)) | |||
1937 | return (EADDRNOTAVAIL49); | |||
1938 | sin = (struct sockaddr_in *)(uintptr_t)(size_t)ifa->ifa_addr; | |||
1939 | v4mreq->imr_interface.s_addr = sin->sin_addr.s_addr; | |||
1940 | IFA_REMREF(ifa)do { (void) ifa_remref(ifa, 0); } while (0); | |||
1941 | ||||
1942 | return (0); | |||
1943 | } | |||
1944 | ||||
1945 | /* | |||
1946 | * Join an IPv6 multicast group, possibly with a source. | |||
1947 | * | |||
1948 | * FIXME: The KAME use of the unspecified address (::) | |||
1949 | * to join *all* multicast groups is currently unsupported. | |||
1950 | */ | |||
1951 | static int | |||
1952 | in6p_join_group(struct inpcb *inp, struct sockopt *sopt) | |||
1953 | { | |||
1954 | struct group_source_req gsr; | |||
1955 | sockunion_t *gsa, *ssa; | |||
1956 | struct ifnet *ifp; | |||
1957 | struct in6_mfilter *imf; | |||
1958 | struct ip6_moptions *imo; | |||
1959 | struct in6_multi *inm = NULL((void *)0); | |||
1960 | struct in6_msource *lims = NULL((void *)0); | |||
1961 | size_t idx; | |||
1962 | int error, is_new; | |||
1963 | uint32_t scopeid = 0; | |||
1964 | struct mld_tparams mtp; | |||
1965 | ||||
1966 | bzero(&mtp, sizeof (mtp)); | |||
1967 | ifp = NULL((void *)0); | |||
1968 | imf = NULL((void *)0); | |||
1969 | error = 0; | |||
1970 | is_new = 0; | |||
1971 | ||||
1972 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
1973 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
1974 | gsa->ss.ss_family = AF_UNSPEC0; | |||
1975 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
1976 | ssa->ss.ss_family = AF_UNSPEC0; | |||
1977 | ||||
1978 | /* | |||
1979 | * Chew everything into struct group_source_req. | |||
1980 | * Overwrite the port field if present, as the sockaddr | |||
1981 | * being copied in may be matched with a binary comparison. | |||
1982 | * Ignore passed-in scope ID. | |||
1983 | */ | |||
1984 | switch (sopt->sopt_name) { | |||
1985 | case IPV6_JOIN_GROUP12: { | |||
1986 | struct ipv6_mreq mreq; | |||
1987 | struct sockaddr_in6 *gsin6; | |||
1988 | ||||
1989 | error = sooptcopyin(sopt, &mreq, sizeof(struct ipv6_mreq), | |||
1990 | sizeof(struct ipv6_mreq)); | |||
1991 | if (error) | |||
1992 | return (error); | |||
1993 | if (IN6_IS_ADDR_V4MAPPED(&mreq.ipv6mr_multiaddr)((*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr )->__u6_addr.__u6_addr8[0]) == 0) && (*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr)->__u6_addr .__u6_addr8[4]) == 0) && (*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr)->__u6_addr.__u6_addr8 [8]) == (__builtin_constant_p(0x0000ffff) ? ((__uint32_t)(((( __uint32_t)(0x0000ffff) & 0xff000000) >> 24) | (((__uint32_t )(0x0000ffff) & 0x00ff0000) >> 8) | (((__uint32_t)( 0x0000ffff) & 0x0000ff00) << 8) | (((__uint32_t)(0x0000ffff ) & 0x000000ff) << 24))) : _OSSwapInt32(0x0000ffff) )))) { | |||
1994 | struct ip_mreq v4mreq; | |||
1995 | struct sockopt v4sopt; | |||
1996 | ||||
1997 | v4mreq.imr_multiaddr.s_addr = | |||
1998 | mreq.ipv6mr_multiaddr.s6_addr32__u6_addr.__u6_addr32[3]; | |||
1999 | if (mreq.ipv6mr_interface == 0) | |||
2000 | v4mreq.imr_interface.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
2001 | else | |||
2002 | error = in6p_lookup_v4addr(&mreq, &v4mreq); | |||
2003 | if (error) | |||
2004 | return (error); | |||
2005 | v4sopt.sopt_dir = SOPT_SET; | |||
2006 | v4sopt.sopt_level = sopt->sopt_level; | |||
2007 | v4sopt.sopt_name = IP_ADD_MEMBERSHIP12; | |||
2008 | v4sopt.sopt_val = CAST_USER_ADDR_T(&v4mreq)((user_addr_t)((uintptr_t)(&v4mreq))); | |||
2009 | v4sopt.sopt_valsize = sizeof(v4mreq); | |||
2010 | v4sopt.sopt_p = kernproc; | |||
2011 | ||||
2012 | return (inp_join_group(inp, &v4sopt)); | |||
2013 | } | |||
2014 | gsa->sin6.sin6_family = AF_INET630; | |||
2015 | gsa->sin6.sin6_len = sizeof(struct sockaddr_in6); | |||
2016 | gsa->sin6.sin6_addr = mreq.ipv6mr_multiaddr; | |||
2017 | ||||
2018 | gsin6 = &gsa->sin6; | |||
2019 | ||||
2020 | /* Only allow IPv6 multicast addresses */ | |||
2021 | if (IN6_IS_ADDR_MULTICAST(&gsin6->sin6_addr)((&gsin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff ) == 0) { | |||
2022 | return (EINVAL22); | |||
2023 | } | |||
2024 | ||||
2025 | if (mreq.ipv6mr_interface == 0) { | |||
2026 | ifp = in6p_lookup_mcast_ifp(inp, gsin6); | |||
2027 | } else { | |||
2028 | ifnet_head_lock_shared(); | |||
2029 | if ((u_int)if_index < mreq.ipv6mr_interface) { | |||
2030 | ifnet_head_done(); | |||
2031 | return (EADDRNOTAVAIL49); | |||
2032 | } | |||
2033 | ifp = ifindex2ifnet[mreq.ipv6mr_interface]; | |||
2034 | ifnet_head_done(); | |||
2035 | } | |||
2036 | MLD_PRINTF(("%s: ipv6mr_interface = %d, ifp = 0x%llx\n",do { if (mld_debug) printf ("%s: ipv6mr_interface = %d, ifp = 0x%llx\n" , __func__, mreq.ipv6mr_interface, (uint64_t)(((vm_offset_t)( ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm )); } while (0) | |||
2037 | __func__, mreq.ipv6mr_interface,do { if (mld_debug) printf ("%s: ipv6mr_interface = %d, ifp = 0x%llx\n" , __func__, mreq.ipv6mr_interface, (uint64_t)(((vm_offset_t)( ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm )); } while (0) | |||
2038 | (uint64_t)VM_KERNEL_ADDRPERM(ifp)))do { if (mld_debug) printf ("%s: ipv6mr_interface = %d, ifp = 0x%llx\n" , __func__, mreq.ipv6mr_interface, (uint64_t)(((vm_offset_t)( ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(ifp) + vm_kernel_addrperm )); } while (0); | |||
2039 | break; | |||
2040 | } | |||
2041 | ||||
2042 | case MCAST_JOIN_GROUP80: | |||
2043 | case MCAST_JOIN_SOURCE_GROUP82: | |||
2044 | if (sopt->sopt_name == MCAST_JOIN_GROUP80) { | |||
2045 | error = sooptcopyin(sopt, &gsr, | |||
2046 | sizeof(struct group_req), | |||
2047 | sizeof(struct group_req)); | |||
2048 | } else if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP82) { | |||
2049 | error = sooptcopyin(sopt, &gsr, | |||
2050 | sizeof(struct group_source_req), | |||
2051 | sizeof(struct group_source_req)); | |||
2052 | } | |||
2053 | if (error) | |||
2054 | return (error); | |||
2055 | ||||
2056 | if (gsa->sin6.sin6_family != AF_INET630 || | |||
2057 | gsa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
2058 | return (EINVAL22); | |||
2059 | ||||
2060 | if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP82) { | |||
2061 | if (ssa->sin6.sin6_family != AF_INET630 || | |||
2062 | ssa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
2063 | return (EINVAL22); | |||
2064 | if (IN6_IS_ADDR_MULTICAST(&ssa->sin6.sin6_addr)((&ssa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
2065 | return (EINVAL22); | |||
2066 | /* | |||
2067 | * TODO: Validate embedded scope ID in source | |||
2068 | * list entry against passed-in ifp, if and only | |||
2069 | * if source list filter entry is iface or node local. | |||
2070 | */ | |||
2071 | in6_clearscope(&ssa->sin6.sin6_addr); | |||
2072 | ssa->sin6.sin6_port = 0; | |||
2073 | ssa->sin6.sin6_scope_id = 0; | |||
2074 | } | |||
2075 | ||||
2076 | ifnet_head_lock_shared(); | |||
2077 | if (gsr.gsr_interface == 0 || | |||
2078 | (u_int)if_index < gsr.gsr_interface) { | |||
2079 | ifnet_head_done(); | |||
2080 | return (EADDRNOTAVAIL49); | |||
2081 | } | |||
2082 | ifp = ifindex2ifnet[gsr.gsr_interface]; | |||
2083 | ifnet_head_done(); | |||
2084 | break; | |||
2085 | ||||
2086 | default: | |||
2087 | MLD_PRINTF(("%s: unknown sopt_name %d\n",do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
2088 | __func__, sopt->sopt_name))do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
2089 | return (EOPNOTSUPP102); | |||
2090 | } | |||
2091 | ||||
2092 | if (!IN6_IS_ADDR_MULTICAST(&gsa->sin6.sin6_addr)((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
2093 | return (EINVAL22); | |||
2094 | ||||
2095 | if (ifp == NULL((void *)0) || (ifp->if_flags & IFF_MULTICAST0x8000) == 0) | |||
2096 | return (EADDRNOTAVAIL49); | |||
2097 | ||||
2098 | gsa->sin6.sin6_port = 0; | |||
2099 | gsa->sin6.sin6_scope_id = 0; | |||
2100 | ||||
2101 | /* | |||
2102 | * Always set the scope zone ID on memberships created from userland. | |||
2103 | * Use the passed-in ifp to do this. | |||
2104 | */ | |||
2105 | (void)in6_setscope(&gsa->sin6.sin6_addr, ifp, &scopeid); | |||
2106 | /* | |||
2107 | * Some addresses are not valid without an embedded scopeid. | |||
2108 | * This check must be present because otherwise we will later hit | |||
2109 | * a VERIFY() in in6_mc_join(). | |||
2110 | */ | |||
2111 | if ((IN6_IS_ADDR_MC_LINKLOCAL(&gsa->sin6.sin6_addr)(((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff) && (((&gsa->sin6.sin6_addr)->__u6_addr .__u6_addr8[1] & 0x0f) == 0x02)) || | |||
2112 | IN6_IS_ADDR_MC_INTFACELOCAL(&gsa->sin6.sin6_addr)(((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff) && (((&gsa->sin6.sin6_addr)->__u6_addr .__u6_addr8[1] & 0x0f) == 0x01))) && | |||
2113 | (scopeid == 0 || gsa->sin6.sin6_addr.s6_addr16__u6_addr.__u6_addr16[1] == 0)) | |||
2114 | return (EINVAL22); | |||
2115 | ||||
2116 | imo = in6p_findmoptions(inp); | |||
2117 | if (imo == NULL((void *)0)) | |||
2118 | return (ENOMEM12); | |||
2119 | ||||
2120 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2121 | idx = im6o_match_group(imo, ifp, &gsa->sa); | |||
2122 | if (idx == (size_t)-1) { | |||
2123 | is_new = 1; | |||
2124 | } else { | |||
2125 | inm = imo->im6o_membership[idx]; | |||
2126 | imf = &imo->im6o_mfilters[idx]; | |||
2127 | if (ssa->ss.ss_family != AF_UNSPEC0) { | |||
2128 | /* | |||
2129 | * MCAST_JOIN_SOURCE_GROUP on an exclusive membership | |||
2130 | * is an error. On an existing inclusive membership, | |||
2131 | * it just adds the source to the filter list. | |||
2132 | */ | |||
2133 | if (imf->im6f_st[1] != MCAST_INCLUDE1) { | |||
2134 | error = EINVAL22; | |||
2135 | goto out_imo_locked; | |||
2136 | } | |||
2137 | /* | |||
2138 | * Throw out duplicates. | |||
2139 | * | |||
2140 | * XXX FIXME: This makes a naive assumption that | |||
2141 | * even if entries exist for *ssa in this imf, | |||
2142 | * they will be rejected as dupes, even if they | |||
2143 | * are not valid in the current mode (in-mode). | |||
2144 | * | |||
2145 | * in6_msource is transactioned just as for anything | |||
2146 | * else in SSM -- but note naive use of in6m_graft() | |||
2147 | * below for allocating new filter entries. | |||
2148 | * | |||
2149 | * This is only an issue if someone mixes the | |||
2150 | * full-state SSM API with the delta-based API, | |||
2151 | * which is discouraged in the relevant RFCs. | |||
2152 | */ | |||
2153 | lims = im6o_match_source(imo, idx, &ssa->sa); | |||
2154 | if (lims != NULL((void *)0) /*&& | |||
2155 | lims->im6sl_st[1] == MCAST_INCLUDE*/) { | |||
2156 | error = EADDRNOTAVAIL49; | |||
2157 | goto out_imo_locked; | |||
2158 | } | |||
2159 | } else { | |||
2160 | /* | |||
2161 | * MCAST_JOIN_GROUP on an existing exclusive | |||
2162 | * membership is an error; return EADDRINUSE | |||
2163 | * to preserve 4.4BSD API idempotence, and | |||
2164 | * avoid tedious detour to code below. | |||
2165 | * NOTE: This is bending RFC 3678 a bit. | |||
2166 | * | |||
2167 | * On an existing inclusive membership, this is also | |||
2168 | * an error; if you want to change filter mode, | |||
2169 | * you must use the userland API setsourcefilter(). | |||
2170 | * XXX We don't reject this for imf in UNDEFINED | |||
2171 | * state at t1, because allocation of a filter | |||
2172 | * is atomic with allocation of a membership. | |||
2173 | */ | |||
2174 | error = EINVAL22; | |||
2175 | /* See comments above for EADDRINUSE */ | |||
2176 | if (imf->im6f_st[1] == MCAST_EXCLUDE2) | |||
2177 | error = EADDRINUSE48; | |||
2178 | goto out_imo_locked; | |||
2179 | } | |||
2180 | } | |||
2181 | ||||
2182 | /* | |||
2183 | * Begin state merge transaction at socket layer. | |||
2184 | */ | |||
2185 | ||||
2186 | if (is_new) { | |||
2187 | if (imo->im6o_num_memberships == imo->im6o_max_memberships) { | |||
2188 | error = im6o_grow(imo, 0); | |||
2189 | if (error) | |||
2190 | goto out_imo_locked; | |||
2191 | } | |||
2192 | /* | |||
2193 | * Allocate the new slot upfront so we can deal with | |||
2194 | * grafting the new source filter in same code path | |||
2195 | * as for join-source on existing membership. | |||
2196 | */ | |||
2197 | idx = imo->im6o_num_memberships; | |||
2198 | imo->im6o_membership[idx] = NULL((void *)0); | |||
2199 | imo->im6o_num_memberships++; | |||
2200 | VERIFY(imo->im6o_mfilters != NULL)((void)(__builtin_expect(!!((long)((imo->im6o_mfilters != ( (void *)0)))), 1L) || assfail("imo->im6o_mfilters != NULL" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 2200 ))); | |||
2201 | imf = &imo->im6o_mfilters[idx]; | |||
2202 | VERIFY(RB_EMPTY(&imf->im6f_sources))((void)(__builtin_expect(!!((long)((((&imf->im6f_sources )->rbh_root == ((void *)0))))), 1L) || assfail("RB_EMPTY(&imf->im6f_sources)" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 2202 ))); | |||
2203 | } | |||
2204 | ||||
2205 | /* | |||
2206 | * Graft new source into filter list for this inpcb's | |||
2207 | * membership of the group. The in6_multi may not have | |||
2208 | * been allocated yet if this is a new membership, however, | |||
2209 | * the in_mfilter slot will be allocated and must be initialized. | |||
2210 | * | |||
2211 | * Note: Grafting of exclusive mode filters doesn't happen | |||
2212 | * in this path. | |||
2213 | * XXX: Should check for non-NULL lims (node exists but may | |||
2214 | * not be in-mode) for interop with full-state API. | |||
2215 | */ | |||
2216 | if (ssa->ss.ss_family != AF_UNSPEC0) { | |||
2217 | /* Membership starts in IN mode */ | |||
2218 | if (is_new) { | |||
2219 | MLD_PRINTF(("%s: new join w/source\n", __func__);do { if (mld_debug) printf ("%s: new join w/source\n", __func__ ); im6f_init(imf, 0, 1); } while (0) | |||
2220 | im6f_init(imf, MCAST_UNDEFINED, MCAST_INCLUDE))do { if (mld_debug) printf ("%s: new join w/source\n", __func__ ); im6f_init(imf, 0, 1); } while (0); | |||
2221 | } else { | |||
2222 | MLD_PRINTF(("%s: %s source\n", __func__, "allow"))do { if (mld_debug) printf ("%s: %s source\n", __func__, "allow" ); } while (0); | |||
2223 | } | |||
2224 | lims = im6f_graft(imf, MCAST_INCLUDE1, &ssa->sin6); | |||
2225 | if (lims == NULL((void *)0)) { | |||
2226 | MLD_PRINTF(("%s: merge imf state failed\n",do { if (mld_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0) | |||
2227 | __func__))do { if (mld_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
2228 | error = ENOMEM12; | |||
2229 | goto out_im6o_free; | |||
2230 | } | |||
2231 | } else { | |||
2232 | /* No address specified; Membership starts in EX mode */ | |||
2233 | if (is_new) { | |||
2234 | MLD_PRINTF(("%s: new join w/o source", __func__))do { if (mld_debug) printf ("%s: new join w/o source", __func__ ); } while (0); | |||
2235 | im6f_init(imf, MCAST_UNDEFINED0, MCAST_EXCLUDE2); | |||
2236 | } | |||
2237 | } | |||
2238 | ||||
2239 | /* | |||
2240 | * Begin state merge transaction at MLD layer. | |||
2241 | */ | |||
2242 | ||||
2243 | if (is_new) { | |||
2244 | /* | |||
2245 | * See inp_join_group() for why we need to unlock | |||
2246 | */ | |||
2247 | IM6O_ADDREF_LOCKED(imo)im6o_addref(imo, 1); | |||
2248 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2249 | socket_unlock(inp->inp_socket, 0); | |||
2250 | ||||
2251 | VERIFY(inm == NULL)((void)(__builtin_expect(!!((long)((inm == ((void *)0)))), 1L ) || assfail("inm == NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 2251))); | |||
2252 | error = in6_mc_join(ifp, &gsa->sin6.sin6_addr, imf, &inm, 0); | |||
2253 | VERIFY(inm != NULL || error != 0)((void)(__builtin_expect(!!((long)((inm != ((void *)0) || error != 0))), 1L) || assfail("inm != NULL || error != 0", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 2253))); | |||
2254 | ||||
2255 | socket_lock(inp->inp_socket, 0); | |||
2256 | IM6O_REMREF(imo)im6o_remref(imo); | |||
2257 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2258 | ||||
2259 | if (error) | |||
2260 | goto out_im6o_free; | |||
2261 | imo->im6o_membership[idx] = inm; /* from in6_mc_join() */ | |||
2262 | } else { | |||
2263 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2264 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
2265 | error = in6m_merge(inm, imf); | |||
2266 | if (error) { | |||
2267 | MLD_PRINTF(("%s: failed to merge inm state\n",do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0) | |||
2268 | __func__))do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2269 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2270 | goto out_im6f_rollback; | |||
2271 | } | |||
2272 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
2273 | error = mld_change_state(inm, &mtp, 0); | |||
2274 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2275 | if (error) { | |||
2276 | MLD_PRINTF(("%s: failed mld downcall\n",do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0) | |||
2277 | __func__))do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0); | |||
2278 | goto out_im6f_rollback; | |||
2279 | } | |||
2280 | } | |||
2281 | ||||
2282 | out_im6f_rollback: | |||
2283 | if (error) { | |||
2284 | im6f_rollback(imf); | |||
2285 | if (is_new) | |||
2286 | im6f_purge(imf); | |||
2287 | else | |||
2288 | im6f_reap(imf); | |||
2289 | } else { | |||
2290 | im6f_commit(imf); | |||
2291 | } | |||
2292 | ||||
2293 | out_im6o_free: | |||
2294 | if (error && is_new) { | |||
2295 | VERIFY(inm == NULL)((void)(__builtin_expect(!!((long)((inm == ((void *)0)))), 1L ) || assfail("inm == NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 2295))); | |||
2296 | imo->im6o_membership[idx] = NULL((void *)0); | |||
2297 | --imo->im6o_num_memberships; | |||
2298 | } | |||
2299 | ||||
2300 | out_imo_locked: | |||
2301 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2302 | IM6O_REMREF(imo)im6o_remref(imo); /* from in6p_findmoptions() */ | |||
2303 | ||||
2304 | /* schedule timer now that we've dropped the lock(s) */ | |||
2305 | mld_set_timeout(&mtp); | |||
2306 | ||||
2307 | return (error); | |||
2308 | } | |||
2309 | ||||
2310 | /* | |||
2311 | * Leave an IPv6 multicast group on an inpcb, possibly with a source. | |||
2312 | */ | |||
2313 | static int | |||
2314 | in6p_leave_group(struct inpcb *inp, struct sockopt *sopt) | |||
2315 | { | |||
2316 | struct ipv6_mreq mreq; | |||
2317 | struct group_source_req gsr; | |||
2318 | sockunion_t *gsa, *ssa; | |||
2319 | struct ifnet *ifp; | |||
2320 | struct in6_mfilter *imf; | |||
2321 | struct ip6_moptions *imo; | |||
2322 | struct in6_msource *ims; | |||
2323 | struct in6_multi *inm = NULL((void *)0); | |||
2324 | uint32_t ifindex = 0; | |||
2325 | size_t idx; | |||
2326 | int error, is_final; | |||
2327 | struct mld_tparams mtp; | |||
2328 | ||||
2329 | bzero(&mtp, sizeof (mtp)); | |||
2330 | ifp = NULL((void *)0); | |||
2331 | error = 0; | |||
2332 | is_final = 1; | |||
2333 | ||||
2334 | memset(&gsr, 0, sizeof(struct group_source_req)); | |||
2335 | gsa = (sockunion_t *)&gsr.gsr_group; | |||
2336 | gsa->ss.ss_family = AF_UNSPEC0; | |||
2337 | ssa = (sockunion_t *)&gsr.gsr_source; | |||
2338 | ssa->ss.ss_family = AF_UNSPEC0; | |||
2339 | ||||
2340 | /* | |||
2341 | * Chew everything passed in up into a struct group_source_req | |||
2342 | * as that is easier to process. | |||
2343 | * Note: Any embedded scope ID in the multicast group passed | |||
2344 | * in by userland is ignored, the interface index is the recommended | |||
2345 | * mechanism to specify an interface; see below. | |||
2346 | */ | |||
2347 | switch (sopt->sopt_name) { | |||
2348 | case IPV6_LEAVE_GROUP13: { | |||
2349 | struct sockaddr_in6 *gsin6; | |||
2350 | ||||
2351 | error = sooptcopyin(sopt, &mreq, sizeof(struct ipv6_mreq), | |||
2352 | sizeof(struct ipv6_mreq)); | |||
2353 | if (error) | |||
2354 | return (error); | |||
2355 | if (IN6_IS_ADDR_V4MAPPED(&mreq.ipv6mr_multiaddr)((*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr )->__u6_addr.__u6_addr8[0]) == 0) && (*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr)->__u6_addr .__u6_addr8[4]) == 0) && (*(const __uint32_t *)(const void *)(&(&mreq.ipv6mr_multiaddr)->__u6_addr.__u6_addr8 [8]) == (__builtin_constant_p(0x0000ffff) ? ((__uint32_t)(((( __uint32_t)(0x0000ffff) & 0xff000000) >> 24) | (((__uint32_t )(0x0000ffff) & 0x00ff0000) >> 8) | (((__uint32_t)( 0x0000ffff) & 0x0000ff00) << 8) | (((__uint32_t)(0x0000ffff ) & 0x000000ff) << 24))) : _OSSwapInt32(0x0000ffff) )))) { | |||
2356 | struct ip_mreq v4mreq; | |||
2357 | struct sockopt v4sopt; | |||
2358 | ||||
2359 | v4mreq.imr_multiaddr.s_addr = | |||
2360 | mreq.ipv6mr_multiaddr.s6_addr32__u6_addr.__u6_addr32[3]; | |||
2361 | if (mreq.ipv6mr_interface == 0) | |||
2362 | v4mreq.imr_interface.s_addr = INADDR_ANY(u_int32_t)0x00000000; | |||
2363 | else | |||
2364 | error = in6p_lookup_v4addr(&mreq, &v4mreq); | |||
2365 | if (error) | |||
2366 | return (error); | |||
2367 | v4sopt.sopt_dir = SOPT_SET; | |||
2368 | v4sopt.sopt_level = sopt->sopt_level; | |||
2369 | v4sopt.sopt_name = IP_DROP_MEMBERSHIP13; | |||
2370 | v4sopt.sopt_val = CAST_USER_ADDR_T(&v4mreq)((user_addr_t)((uintptr_t)(&v4mreq))); | |||
2371 | v4sopt.sopt_valsize = sizeof(v4mreq); | |||
2372 | v4sopt.sopt_p = kernproc; | |||
2373 | ||||
2374 | return (inp_leave_group(inp, &v4sopt)); | |||
2375 | } | |||
2376 | gsa->sin6.sin6_family = AF_INET630; | |||
2377 | gsa->sin6.sin6_len = sizeof(struct sockaddr_in6); | |||
2378 | gsa->sin6.sin6_addr = mreq.ipv6mr_multiaddr; | |||
2379 | gsa->sin6.sin6_port = 0; | |||
2380 | gsa->sin6.sin6_scope_id = 0; | |||
2381 | ifindex = mreq.ipv6mr_interface; | |||
2382 | gsin6 = &gsa->sin6; | |||
2383 | /* Only allow IPv6 multicast addresses */ | |||
2384 | if (IN6_IS_ADDR_MULTICAST(&gsin6->sin6_addr)((&gsin6->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff ) == 0) { | |||
2385 | return (EINVAL22); | |||
2386 | } | |||
2387 | break; | |||
2388 | } | |||
2389 | ||||
2390 | case MCAST_LEAVE_GROUP81: | |||
2391 | case MCAST_LEAVE_SOURCE_GROUP83: | |||
2392 | if (sopt->sopt_name == MCAST_LEAVE_GROUP81) { | |||
2393 | error = sooptcopyin(sopt, &gsr, | |||
2394 | sizeof(struct group_req), | |||
2395 | sizeof(struct group_req)); | |||
2396 | } else if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP83) { | |||
2397 | error = sooptcopyin(sopt, &gsr, | |||
2398 | sizeof(struct group_source_req), | |||
2399 | sizeof(struct group_source_req)); | |||
2400 | } | |||
2401 | if (error) | |||
2402 | return (error); | |||
2403 | ||||
2404 | if (gsa->sin6.sin6_family != AF_INET630 || | |||
2405 | gsa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
2406 | return (EINVAL22); | |||
2407 | if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP83) { | |||
2408 | if (ssa->sin6.sin6_family != AF_INET630 || | |||
2409 | ssa->sin6.sin6_len != sizeof(struct sockaddr_in6)) | |||
2410 | return (EINVAL22); | |||
2411 | if (IN6_IS_ADDR_MULTICAST(&ssa->sin6.sin6_addr)((&ssa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
2412 | return (EINVAL22); | |||
2413 | /* | |||
2414 | * TODO: Validate embedded scope ID in source | |||
2415 | * list entry against passed-in ifp, if and only | |||
2416 | * if source list filter entry is iface or node local. | |||
2417 | */ | |||
2418 | in6_clearscope(&ssa->sin6.sin6_addr); | |||
2419 | } | |||
2420 | gsa->sin6.sin6_port = 0; | |||
2421 | gsa->sin6.sin6_scope_id = 0; | |||
2422 | ifindex = gsr.gsr_interface; | |||
2423 | break; | |||
2424 | ||||
2425 | default: | |||
2426 | MLD_PRINTF(("%s: unknown sopt_name %d\n",do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0) | |||
2427 | __func__, sopt->sopt_name))do { if (mld_debug) printf ("%s: unknown sopt_name %d\n", __func__ , sopt->sopt_name); } while (0); | |||
2428 | return (EOPNOTSUPP102); | |||
2429 | } | |||
2430 | ||||
2431 | if (!IN6_IS_ADDR_MULTICAST(&gsa->sin6.sin6_addr)((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
2432 | return (EINVAL22); | |||
2433 | ||||
2434 | /* | |||
2435 | * Validate interface index if provided. If no interface index | |||
2436 | * was provided separately, attempt to look the membership up | |||
2437 | * from the default scope as a last resort to disambiguate | |||
2438 | * the membership we are being asked to leave. | |||
2439 | * XXX SCOPE6 lock potentially taken here. | |||
2440 | */ | |||
2441 | if (ifindex != 0) { | |||
2442 | ifnet_head_lock_shared(); | |||
2443 | if ((u_int)if_index < ifindex) { | |||
2444 | ifnet_head_done(); | |||
2445 | return (EADDRNOTAVAIL49); | |||
2446 | } | |||
2447 | ifp = ifindex2ifnet[ifindex]; | |||
2448 | ifnet_head_done(); | |||
2449 | if (ifp == NULL((void *)0)) | |||
2450 | return (EADDRNOTAVAIL49); | |||
2451 | (void) in6_setscope(&gsa->sin6.sin6_addr, ifp, NULL((void *)0)); | |||
2452 | } else { | |||
2453 | error = sa6_embedscope(&gsa->sin6, ip6_use_defzone); | |||
2454 | if (error) | |||
2455 | return (EADDRNOTAVAIL49); | |||
2456 | /* | |||
2457 | * Some badly behaved applications don't pass an ifindex | |||
2458 | * or a scope ID, which is an API violation. In this case, | |||
2459 | * perform a lookup as per a v6 join. | |||
2460 | * | |||
2461 | * XXX For now, stomp on zone ID for the corner case. | |||
2462 | * This is not the 'KAME way', but we need to see the ifp | |||
2463 | * directly until such time as this implementation is | |||
2464 | * refactored, assuming the scope IDs are the way to go. | |||
2465 | */ | |||
2466 | ifindex = ntohs(gsa->sin6.sin6_addr.s6_addr16[1])((__uint16_t)(__builtin_constant_p(gsa->sin6.sin6_addr.__u6_addr .__u6_addr16[1]) ? ((__uint16_t)((((__uint16_t)(gsa->sin6. sin6_addr.__u6_addr.__u6_addr16[1]) & 0xff00) >> 8) | (((__uint16_t)(gsa->sin6.sin6_addr.__u6_addr.__u6_addr16 [1]) & 0x00ff) << 8))) : _OSSwapInt16(gsa->sin6. sin6_addr.__u6_addr.__u6_addr16[1]))); | |||
2467 | if (ifindex == 0) { | |||
2468 | MLD_PRINTF(("%s: warning: no ifindex, looking up "do { if (mld_debug) printf ("%s: warning: no ifindex, looking up " "ifp for group %s.\n", __func__, ip6_sprintf(&gsa->sin6 .sin6_addr)); } while (0) | |||
2469 | "ifp for group %s.\n", __func__,do { if (mld_debug) printf ("%s: warning: no ifindex, looking up " "ifp for group %s.\n", __func__, ip6_sprintf(&gsa->sin6 .sin6_addr)); } while (0) | |||
2470 | ip6_sprintf(&gsa->sin6.sin6_addr)))do { if (mld_debug) printf ("%s: warning: no ifindex, looking up " "ifp for group %s.\n", __func__, ip6_sprintf(&gsa->sin6 .sin6_addr)); } while (0); | |||
2471 | ifp = in6p_lookup_mcast_ifp(inp, &gsa->sin6); | |||
2472 | } else { | |||
2473 | ifnet_head_lock_shared(); | |||
2474 | ifp = ifindex2ifnet[ifindex]; | |||
2475 | ifnet_head_done(); | |||
2476 | } | |||
2477 | if (ifp == NULL((void *)0)) | |||
2478 | return (EADDRNOTAVAIL49); | |||
2479 | } | |||
2480 | ||||
2481 | VERIFY(ifp != NULL)((void)(__builtin_expect(!!((long)((ifp != ((void *)0)))), 1L ) || assfail("ifp != NULL", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 2481))); | |||
2482 | MLD_PRINTF(("%s: ifp = 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: ifp = 0x%llx\n", __func__, ( uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(ifp) + vm_kernel_addrperm)); } while (0) | |||
2483 | (uint64_t)VM_KERNEL_ADDRPERM(ifp)))do { if (mld_debug) printf ("%s: ifp = 0x%llx\n", __func__, ( uint64_t)(((vm_offset_t)(ifp) == 0) ? (vm_offset_t)(0) : (vm_offset_t )(ifp) + vm_kernel_addrperm)); } while (0); | |||
2484 | ||||
2485 | /* | |||
2486 | * Find the membership in the membership array. | |||
2487 | */ | |||
2488 | imo = in6p_findmoptions(inp); | |||
2489 | if (imo == NULL((void *)0)) | |||
2490 | return (ENOMEM12); | |||
2491 | ||||
2492 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2493 | idx = im6o_match_group(imo, ifp, &gsa->sa); | |||
2494 | if (idx == (size_t)-1) { | |||
2495 | error = EADDRNOTAVAIL49; | |||
2496 | goto out_locked; | |||
2497 | } | |||
2498 | inm = imo->im6o_membership[idx]; | |||
2499 | imf = &imo->im6o_mfilters[idx]; | |||
2500 | ||||
2501 | if (ssa->ss.ss_family != AF_UNSPEC0) | |||
2502 | is_final = 0; | |||
2503 | ||||
2504 | /* | |||
2505 | * Begin state merge transaction at socket layer. | |||
2506 | */ | |||
2507 | ||||
2508 | /* | |||
2509 | * If we were instructed only to leave a given source, do so. | |||
2510 | * MCAST_LEAVE_SOURCE_GROUP is only valid for inclusive memberships. | |||
2511 | */ | |||
2512 | if (is_final) { | |||
2513 | im6f_leave(imf); | |||
2514 | } else { | |||
2515 | if (imf->im6f_st[0] == MCAST_EXCLUDE2) { | |||
2516 | error = EADDRNOTAVAIL49; | |||
2517 | goto out_locked; | |||
2518 | } | |||
2519 | ims = im6o_match_source(imo, idx, &ssa->sa); | |||
2520 | if (ims == NULL((void *)0)) { | |||
2521 | MLD_PRINTF(("%s: source %s %spresent\n", __func__,do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), "not "); } while ( 0) | |||
2522 | ip6_sprintf(&ssa->sin6.sin6_addr),do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), "not "); } while ( 0) | |||
2523 | "not "))do { if (mld_debug) printf ("%s: source %s %spresent\n", __func__ , ip6_sprintf(&ssa->sin6.sin6_addr), "not "); } while ( 0); | |||
2524 | error = EADDRNOTAVAIL49; | |||
2525 | goto out_locked; | |||
2526 | } | |||
2527 | MLD_PRINTF(("%s: %s source\n", __func__, "block"))do { if (mld_debug) printf ("%s: %s source\n", __func__, "block" ); } while (0); | |||
2528 | error = im6f_prune(imf, &ssa->sin6); | |||
2529 | if (error) { | |||
2530 | MLD_PRINTF(("%s: merge imf state failed\n",do { if (mld_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0) | |||
2531 | __func__))do { if (mld_debug) printf ("%s: merge imf state failed\n", __func__ ); } while (0); | |||
2532 | goto out_locked; | |||
2533 | } | |||
2534 | } | |||
2535 | ||||
2536 | /* | |||
2537 | * Begin state merge transaction at MLD layer. | |||
2538 | */ | |||
2539 | ||||
2540 | if (is_final) { | |||
2541 | /* | |||
2542 | * Give up the multicast address record to which | |||
2543 | * the membership points. Reference held in im6o | |||
2544 | * will be released below. | |||
2545 | */ | |||
2546 | (void) in6_mc_leave(inm, imf); | |||
2547 | } else { | |||
2548 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2549 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
2550 | error = in6m_merge(inm, imf); | |||
2551 | if (error) { | |||
2552 | MLD_PRINTF(("%s: failed to merge inm state\n",do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0) | |||
2553 | __func__))do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2554 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2555 | goto out_im6f_rollback; | |||
2556 | } | |||
2557 | ||||
2558 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
2559 | error = mld_change_state(inm, &mtp, 0); | |||
2560 | if (error) { | |||
2561 | MLD_PRINTF(("%s: failed mld downcall\n", __func__))do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0); | |||
2562 | } | |||
2563 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2564 | } | |||
2565 | ||||
2566 | out_im6f_rollback: | |||
2567 | if (error) | |||
2568 | im6f_rollback(imf); | |||
2569 | else | |||
2570 | im6f_commit(imf); | |||
2571 | ||||
2572 | im6f_reap(imf); | |||
2573 | ||||
2574 | if (is_final) { | |||
2575 | /* Remove the gap in the membership array. */ | |||
2576 | VERIFY(inm == imo->im6o_membership[idx])((void)(__builtin_expect(!!((long)((inm == imo->im6o_membership [idx]))), 1L) || assfail("inm == imo->im6o_membership[idx]" , "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c", 2576 ))); | |||
2577 | imo->im6o_membership[idx] = NULL((void *)0); | |||
2578 | ||||
2579 | /* | |||
2580 | * See inp_join_group() for why we need to unlock | |||
2581 | */ | |||
2582 | IM6O_ADDREF_LOCKED(imo)im6o_addref(imo, 1); | |||
2583 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2584 | socket_unlock(inp->inp_socket, 0); | |||
2585 | ||||
2586 | IN6M_REMREF(inm)in6m_remref(inm, 0); | |||
2587 | ||||
2588 | socket_lock(inp->inp_socket, 0); | |||
2589 | IM6O_REMREF(imo)im6o_remref(imo); | |||
2590 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2591 | ||||
2592 | for (++idx; idx < imo->im6o_num_memberships; ++idx) { | |||
2593 | imo->im6o_membership[idx-1] = imo->im6o_membership[idx]; | |||
2594 | imo->im6o_mfilters[idx-1] = imo->im6o_mfilters[idx]; | |||
2595 | } | |||
2596 | imo->im6o_num_memberships--; | |||
2597 | } | |||
2598 | ||||
2599 | out_locked: | |||
2600 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2601 | IM6O_REMREF(imo)im6o_remref(imo); /* from in6p_findmoptions() */ | |||
2602 | ||||
2603 | /* schedule timer now that we've dropped the lock(s) */ | |||
2604 | mld_set_timeout(&mtp); | |||
2605 | ||||
2606 | return (error); | |||
2607 | } | |||
2608 | ||||
2609 | /* | |||
2610 | * Select the interface for transmitting IPv6 multicast datagrams. | |||
2611 | * | |||
2612 | * Either an instance of struct in6_addr or an instance of struct ipv6_mreqn | |||
2613 | * may be passed to this socket option. An address of in6addr_any or an | |||
2614 | * interface index of 0 is used to remove a previous selection. | |||
2615 | * When no interface is selected, one is chosen for every send. | |||
2616 | */ | |||
2617 | static int | |||
2618 | in6p_set_multicast_if(struct inpcb *inp, struct sockopt *sopt) | |||
2619 | { | |||
2620 | struct ifnet *ifp; | |||
2621 | struct ip6_moptions *imo; | |||
2622 | u_int ifindex; | |||
2623 | int error; | |||
2624 | ||||
2625 | if (sopt->sopt_valsize != sizeof(u_int)) | |||
2626 | return (EINVAL22); | |||
2627 | ||||
2628 | error = sooptcopyin(sopt, &ifindex, sizeof(u_int), sizeof(u_int)); | |||
2629 | if (error) | |||
2630 | return (error); | |||
2631 | ||||
2632 | ifnet_head_lock_shared(); | |||
2633 | if ((u_int)if_index < ifindex) { | |||
2634 | ifnet_head_done(); | |||
2635 | return (EINVAL22); | |||
2636 | } | |||
2637 | ||||
2638 | ifp = ifindex2ifnet[ifindex]; | |||
2639 | ifnet_head_done(); | |||
2640 | if (ifp == NULL((void *)0) || (ifp->if_flags & IFF_MULTICAST0x8000) == 0) | |||
2641 | return (EADDRNOTAVAIL49); | |||
2642 | ||||
2643 | imo = in6p_findmoptions(inp); | |||
2644 | if (imo == NULL((void *)0)) | |||
2645 | return (ENOMEM12); | |||
2646 | ||||
2647 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2648 | imo->im6o_multicast_ifp = ifp; | |||
2649 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2650 | IM6O_REMREF(imo)im6o_remref(imo); /* from in6p_findmoptions() */ | |||
2651 | ||||
2652 | return (0); | |||
2653 | } | |||
2654 | ||||
2655 | /* | |||
2656 | * Atomically set source filters on a socket for an IPv6 multicast group. | |||
2657 | * | |||
2658 | */ | |||
2659 | static int | |||
2660 | in6p_set_source_filters(struct inpcb *inp, struct sockopt *sopt) | |||
2661 | { | |||
2662 | struct __msfilterreq64 msfr, msfr64; | |||
2663 | struct __msfilterreq32 msfr32; | |||
2664 | sockunion_t *gsa; | |||
2665 | struct ifnet *ifp; | |||
2666 | struct in6_mfilter *imf; | |||
2667 | struct ip6_moptions *imo; | |||
2668 | struct in6_multi *inm; | |||
2669 | size_t idx; | |||
2670 | int error; | |||
2671 | user_addr_t tmp_ptr; | |||
2672 | struct mld_tparams mtp; | |||
2673 | ||||
2674 | bzero(&mtp, sizeof (mtp)); | |||
2675 | ||||
2676 | if (IS_64BIT_PROCESS(current_proc())) { | |||
2677 | error = sooptcopyin(sopt, &msfr64, | |||
2678 | sizeof(struct __msfilterreq64), | |||
2679 | sizeof(struct __msfilterreq64)); | |||
2680 | if (error) | |||
2681 | return (error); | |||
2682 | /* we never use msfr.msfr_srcs; */ | |||
2683 | memcpy(&msfr, &msfr64, sizeof(msfr)); | |||
2684 | } else { | |||
2685 | error = sooptcopyin(sopt, &msfr32, | |||
2686 | sizeof(struct __msfilterreq32), | |||
2687 | sizeof(struct __msfilterreq32)); | |||
2688 | if (error) | |||
2689 | return (error); | |||
2690 | /* we never use msfr.msfr_srcs; */ | |||
2691 | memcpy(&msfr, &msfr32, sizeof(msfr)); | |||
2692 | } | |||
2693 | ||||
2694 | if ((size_t) msfr.msfr_nsrcs > | |||
2695 | UINT32_MAX4294967295U / sizeof(struct sockaddr_storage)) | |||
2696 | msfr.msfr_nsrcs = UINT32_MAX4294967295U / sizeof(struct sockaddr_storage); | |||
2697 | ||||
2698 | if (msfr.msfr_nsrcs > in6_mcast_maxsocksrc) | |||
2699 | return (ENOBUFS55); | |||
2700 | ||||
2701 | if (msfr.msfr_fmode != MCAST_EXCLUDE2 && | |||
2702 | msfr.msfr_fmode != MCAST_INCLUDE1) | |||
2703 | return (EINVAL22); | |||
2704 | ||||
2705 | if (msfr.msfr_group.ss_family != AF_INET630 || | |||
2706 | msfr.msfr_group.ss_len != sizeof(struct sockaddr_in6)) | |||
2707 | return (EINVAL22); | |||
2708 | ||||
2709 | gsa = (sockunion_t *)&msfr.msfr_group; | |||
2710 | if (!IN6_IS_ADDR_MULTICAST(&gsa->sin6.sin6_addr)((&gsa->sin6.sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff)) | |||
2711 | return (EINVAL22); | |||
2712 | ||||
2713 | gsa->sin6.sin6_port = 0; /* ignore port */ | |||
2714 | ||||
2715 | ifnet_head_lock_shared(); | |||
2716 | if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) { | |||
2717 | ifnet_head_done(); | |||
2718 | return (EADDRNOTAVAIL49); | |||
2719 | } | |||
2720 | ifp = ifindex2ifnet[msfr.msfr_ifindex]; | |||
2721 | ifnet_head_done(); | |||
2722 | if (ifp == NULL((void *)0)) | |||
2723 | return (EADDRNOTAVAIL49); | |||
2724 | ||||
2725 | (void)in6_setscope(&gsa->sin6.sin6_addr, ifp, NULL((void *)0)); | |||
2726 | ||||
2727 | /* | |||
2728 | * Take the INP write lock. | |||
2729 | * Check if this socket is a member of this group. | |||
2730 | */ | |||
2731 | imo = in6p_findmoptions(inp); | |||
2732 | if (imo == NULL((void *)0)) | |||
2733 | return (ENOMEM12); | |||
2734 | ||||
2735 | IM6O_LOCK(imo)lck_mtx_lock(&(imo)->im6o_lock); | |||
2736 | idx = im6o_match_group(imo, ifp, &gsa->sa); | |||
2737 | if (idx == (size_t)-1 || imo->im6o_mfilters == NULL((void *)0)) { | |||
2738 | error = EADDRNOTAVAIL49; | |||
2739 | goto out_imo_locked; | |||
2740 | } | |||
2741 | inm = imo->im6o_membership[idx]; | |||
2742 | imf = &imo->im6o_mfilters[idx]; | |||
2743 | ||||
2744 | /* | |||
2745 | * Begin state merge transaction at socket layer. | |||
2746 | */ | |||
2747 | ||||
2748 | imf->im6f_st[1] = msfr.msfr_fmode; | |||
2749 | ||||
2750 | /* | |||
2751 | * Apply any new source filters, if present. | |||
2752 | * Make a copy of the user-space source vector so | |||
2753 | * that we may copy them with a single copyin. This | |||
2754 | * allows us to deal with page faults up-front. | |||
2755 | */ | |||
2756 | if (msfr.msfr_nsrcs > 0) { | |||
2757 | struct in6_msource *lims; | |||
2758 | struct sockaddr_in6 *psin; | |||
2759 | struct sockaddr_storage *kss, *pkss; | |||
2760 | unsigned int i; | |||
2761 | ||||
2762 | if (IS_64BIT_PROCESS(current_proc())) | |||
2763 | tmp_ptr = msfr64.msfr_srcs; | |||
2764 | else | |||
2765 | tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs)((user_addr_t)((uintptr_t)(msfr32.msfr_srcs))); | |||
2766 | ||||
2767 | MLD_PRINTF(("%s: loading %lu source list entries\n",do { if (mld_debug) printf ("%s: loading %lu source list entries\n" , __func__, (unsigned long)msfr.msfr_nsrcs); } while (0) | |||
2768 | __func__, (unsigned long)msfr.msfr_nsrcs))do { if (mld_debug) printf ("%s: loading %lu source list entries\n" , __func__, (unsigned long)msfr.msfr_nsrcs); } while (0); | |||
2769 | kss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss),({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss), 80, 0x0000 , &site); }) | |||
2770 | M_TEMP, M_WAITOK)({ static vm_allocation_site_t site __attribute__((section("__DATA, __data" ))); __MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss), 80, 0x0000 , &site); }); | |||
2771 | if (kss == NULL((void *)0)) { | |||
2772 | error = ENOMEM12; | |||
2773 | goto out_imo_locked; | |||
2774 | } | |||
2775 | ||||
2776 | error = copyin(tmp_ptr, kss, | |||
2777 | (size_t) msfr.msfr_nsrcs * sizeof(*kss)); | |||
2778 | if (error) { | |||
2779 | FREE(kss, M_TEMP)_FREE((void *)kss, 80); | |||
2780 | goto out_imo_locked; | |||
2781 | } | |||
2782 | ||||
2783 | /* | |||
2784 | * Mark all source filters as UNDEFINED at t1. | |||
2785 | * Restore new group filter mode, as im6f_leave() | |||
2786 | * will set it to INCLUDE. | |||
2787 | */ | |||
2788 | im6f_leave(imf); | |||
2789 | imf->im6f_st[1] = msfr.msfr_fmode; | |||
2790 | ||||
2791 | /* | |||
2792 | * Update socket layer filters at t1, lazy-allocating | |||
2793 | * new entries. This saves a bunch of memory at the | |||
2794 | * cost of one RB_FIND() per source entry; duplicate | |||
2795 | * entries in the msfr_nsrcs vector are ignored. | |||
2796 | * If we encounter an error, rollback transaction. | |||
2797 | * | |||
2798 | * XXX This too could be replaced with a set-symmetric | |||
2799 | * difference like loop to avoid walking from root | |||
2800 | * every time, as the key space is common. | |||
2801 | */ | |||
2802 | for (i = 0, pkss = kss; i < msfr.msfr_nsrcs; i++, pkss++) { | |||
2803 | psin = (struct sockaddr_in6 *)pkss; | |||
2804 | if (psin->sin6_family != AF_INET630) { | |||
2805 | error = EAFNOSUPPORT47; | |||
2806 | break; | |||
2807 | } | |||
2808 | if (psin->sin6_len != sizeof(struct sockaddr_in6)) { | |||
2809 | error = EINVAL22; | |||
2810 | break; | |||
2811 | } | |||
2812 | if (IN6_IS_ADDR_MULTICAST(&psin->sin6_addr)((&psin->sin6_addr)->__u6_addr.__u6_addr8[0] == 0xff )) { | |||
2813 | error = EINVAL22; | |||
2814 | break; | |||
2815 | } | |||
2816 | /* | |||
2817 | * TODO: Validate embedded scope ID in source | |||
2818 | * list entry against passed-in ifp, if and only | |||
2819 | * if source list filter entry is iface or node local. | |||
2820 | */ | |||
2821 | in6_clearscope(&psin->sin6_addr); | |||
2822 | error = im6f_get_source(imf, psin, &lims); | |||
2823 | if (error) | |||
2824 | break; | |||
2825 | lims->im6sl_st[1] = imf->im6f_st[1]; | |||
2826 | } | |||
2827 | FREE(kss, M_TEMP)_FREE((void *)kss, 80); | |||
2828 | } | |||
2829 | ||||
2830 | if (error) | |||
2831 | goto out_im6f_rollback; | |||
2832 | ||||
2833 | /* | |||
2834 | * Begin state merge transaction at MLD layer. | |||
2835 | */ | |||
2836 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
2837 | MLD_PRINTF(("%s: merge inm state\n", __func__))do { if (mld_debug) printf ("%s: merge inm state\n", __func__ ); } while (0); | |||
2838 | error = in6m_merge(inm, imf); | |||
2839 | if (error) { | |||
2840 | MLD_PRINTF(("%s: failed to merge inm state\n", __func__))do { if (mld_debug) printf ("%s: failed to merge inm state\n" , __func__); } while (0); | |||
2841 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2842 | goto out_im6f_rollback; | |||
2843 | } | |||
2844 | ||||
2845 | MLD_PRINTF(("%s: doing mld downcall\n", __func__))do { if (mld_debug) printf ("%s: doing mld downcall\n", __func__ ); } while (0); | |||
2846 | error = mld_change_state(inm, &mtp, 0); | |||
2847 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
2848 | #if MLD_DEBUG1 | |||
2849 | if (error) | |||
2850 | MLD_PRINTF(("%s: failed mld downcall\n", __func__))do { if (mld_debug) printf ("%s: failed mld downcall\n", __func__ ); } while (0); | |||
2851 | #endif | |||
2852 | ||||
2853 | out_im6f_rollback: | |||
2854 | if (error) | |||
2855 | im6f_rollback(imf); | |||
2856 | else | |||
2857 | im6f_commit(imf); | |||
2858 | ||||
2859 | im6f_reap(imf); | |||
2860 | ||||
2861 | out_imo_locked: | |||
2862 | IM6O_UNLOCK(imo)lck_mtx_unlock(&(imo)->im6o_lock); | |||
2863 | IM6O_REMREF(imo)im6o_remref(imo); /* from in6p_findmoptions() */ | |||
2864 | ||||
2865 | /* schedule timer now that we've dropped the lock(s) */ | |||
2866 | mld_set_timeout(&mtp); | |||
2867 | ||||
2868 | return (error); | |||
2869 | } | |||
2870 | ||||
2871 | /* | |||
2872 | * Set the IP multicast options in response to user setsockopt(). | |||
2873 | * | |||
2874 | * Many of the socket options handled in this function duplicate the | |||
2875 | * functionality of socket options in the regular unicast API. However, | |||
2876 | * it is not possible to merge the duplicate code, because the idempotence | |||
2877 | * of the IPv6 multicast part of the BSD Sockets API must be preserved; | |||
2878 | * the effects of these options must be treated as separate and distinct. | |||
2879 | * | |||
2880 | */ | |||
2881 | int | |||
2882 | ip6_setmoptions(struct inpcb *inp, struct sockopt *sopt) | |||
2883 | { | |||
2884 | struct ip6_moptions *im6o; | |||
2885 | int error; | |||
2886 | ||||
2887 | error = 0; | |||
2888 | ||||
2889 | /* | |||
2890 | * If socket is neither of type SOCK_RAW or SOCK_DGRAM, | |||
2891 | * or is a divert socket, reject it. | |||
2892 | */ | |||
2893 | if (SOCK_PROTO(inp->inp_socket)((inp->inp_socket)->so_proto->pr_protocol) == IPPROTO_DIVERT254 || | |||
2894 | (SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_RAW3 && | |||
2895 | SOCK_TYPE(inp->inp_socket)((inp->inp_socket)->so_proto->pr_type) != SOCK_DGRAM2)) | |||
2896 | return (EOPNOTSUPP102); | |||
2897 | ||||
2898 | switch (sopt->sopt_name) { | |||
2899 | case IPV6_MULTICAST_IF9: | |||
2900 | error = in6p_set_multicast_if(inp, sopt); | |||
2901 | break; | |||
2902 | ||||
2903 | case IPV6_MULTICAST_HOPS10: { | |||
2904 | int hlim; | |||
2905 | ||||
2906 | if (sopt->sopt_valsize != sizeof(int)) { | |||
2907 | error = EINVAL22; | |||
2908 | break; | |||
2909 | } | |||
2910 | error = sooptcopyin(sopt, &hlim, sizeof(hlim), sizeof(int)); | |||
2911 | if (error) | |||
2912 | break; | |||
2913 | if (hlim < -1 || hlim > 255) { | |||
2914 | error = EINVAL22; | |||
2915 | break; | |||
2916 | } else if (hlim == -1) { | |||
2917 | hlim = ip6_defmcasthlim; | |||
2918 | } | |||
2919 | im6o = in6p_findmoptions(inp); | |||
2920 | if (im6o == NULL((void *)0)) { | |||
2921 | error = ENOMEM12; | |||
2922 | break; | |||
2923 | } | |||
2924 | IM6O_LOCK(im6o)lck_mtx_lock(&(im6o)->im6o_lock); | |||
2925 | im6o->im6o_multicast_hlim = hlim; | |||
2926 | IM6O_UNLOCK(im6o)lck_mtx_unlock(&(im6o)->im6o_lock); | |||
2927 | IM6O_REMREF(im6o)im6o_remref(im6o); /* from in6p_findmoptions() */ | |||
2928 | break; | |||
2929 | } | |||
2930 | ||||
2931 | case IPV6_MULTICAST_LOOP11: { | |||
2932 | u_int loop; | |||
2933 | ||||
2934 | /* | |||
2935 | * Set the loopback flag for outgoing multicast packets. | |||
2936 | * Must be zero or one. | |||
2937 | */ | |||
2938 | if (sopt->sopt_valsize != sizeof(u_int)) { | |||
2939 | error = EINVAL22; | |||
2940 | break; | |||
2941 | } | |||
2942 | error = sooptcopyin(sopt, &loop, sizeof(u_int), sizeof(u_int)); | |||
2943 | if (error) | |||
2944 | break; | |||
2945 | if (loop > 1) { | |||
2946 | error = EINVAL22; | |||
2947 | break; | |||
2948 | } | |||
2949 | im6o = in6p_findmoptions(inp); | |||
2950 | if (im6o == NULL((void *)0)) { | |||
2951 | error = ENOMEM12; | |||
2952 | break; | |||
2953 | } | |||
2954 | IM6O_LOCK(im6o)lck_mtx_lock(&(im6o)->im6o_lock); | |||
2955 | im6o->im6o_multicast_loop = loop; | |||
2956 | IM6O_UNLOCK(im6o)lck_mtx_unlock(&(im6o)->im6o_lock); | |||
2957 | IM6O_REMREF(im6o)im6o_remref(im6o); /* from in6p_findmoptions() */ | |||
2958 | break; | |||
2959 | } | |||
2960 | ||||
2961 | case IPV6_JOIN_GROUP12: | |||
2962 | case MCAST_JOIN_GROUP80: | |||
2963 | case MCAST_JOIN_SOURCE_GROUP82: | |||
2964 | error = in6p_join_group(inp, sopt); | |||
2965 | break; | |||
2966 | ||||
2967 | case IPV6_LEAVE_GROUP13: | |||
2968 | case MCAST_LEAVE_GROUP81: | |||
2969 | case MCAST_LEAVE_SOURCE_GROUP83: | |||
2970 | error = in6p_leave_group(inp, sopt); | |||
2971 | break; | |||
2972 | ||||
2973 | case MCAST_BLOCK_SOURCE84: | |||
2974 | case MCAST_UNBLOCK_SOURCE85: | |||
2975 | error = in6p_block_unblock_source(inp, sopt); | |||
2976 | break; | |||
2977 | ||||
2978 | case IPV6_MSFILTER74: | |||
2979 | error = in6p_set_source_filters(inp, sopt); | |||
2980 | break; | |||
2981 | ||||
2982 | default: | |||
2983 | error = EOPNOTSUPP102; | |||
2984 | break; | |||
2985 | } | |||
2986 | ||||
2987 | return (error); | |||
2988 | } | |||
2989 | /* | |||
2990 | * Expose MLD's multicast filter mode and source list(s) to userland, | |||
2991 | * keyed by (ifindex, group). | |||
2992 | * The filter mode is written out as a uint32_t, followed by | |||
2993 | * 0..n of struct in6_addr. | |||
2994 | * For use by ifmcstat(8). | |||
2995 | */ | |||
2996 | static int | |||
2997 | sysctl_ip6_mcast_filters SYSCTL_HANDLER_ARGS(struct sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req) | |||
2998 | { | |||
2999 | #pragma unused(oidp) | |||
3000 | ||||
3001 | struct in6_addr mcaddr; | |||
3002 | struct in6_addr src; | |||
3003 | struct ifnet *ifp; | |||
3004 | struct in6_multi *inm; | |||
3005 | struct in6_multistep step; | |||
3006 | struct ip6_msource *ims; | |||
3007 | int *name; | |||
3008 | int retval = 0; | |||
3009 | u_int namelen; | |||
3010 | uint32_t fmode, ifindex; | |||
3011 | ||||
3012 | name = (int *)arg1; | |||
3013 | namelen = arg2; | |||
3014 | ||||
3015 | if (req->newptr != USER_ADDR_NULL((user_addr_t) 0)) | |||
3016 | return (EPERM1); | |||
3017 | ||||
3018 | /* int: ifindex + 4 * 32 bits of IPv6 address */ | |||
3019 | if (namelen != 5) | |||
3020 | return (EINVAL22); | |||
3021 | ||||
3022 | ifindex = name[0]; | |||
3023 | ifnet_head_lock_shared(); | |||
3024 | if (ifindex <= 0 || ifindex > (u_int)if_index) { | |||
3025 | MLD_PRINTF(("%s: ifindex %u out of range\n",do { if (mld_debug) printf ("%s: ifindex %u out of range\n", __func__ , ifindex); } while (0) | |||
3026 | __func__, ifindex))do { if (mld_debug) printf ("%s: ifindex %u out of range\n", __func__ , ifindex); } while (0); | |||
3027 | ifnet_head_done(); | |||
3028 | return (ENOENT2); | |||
3029 | } | |||
3030 | ||||
3031 | memcpy(&mcaddr, &name[1], sizeof(struct in6_addr)); | |||
3032 | if (!IN6_IS_ADDR_MULTICAST(&mcaddr)((&mcaddr)->__u6_addr.__u6_addr8[0] == 0xff)) { | |||
3033 | MLD_PRINTF(("%s: group %s is not multicast\n",do { if (mld_debug) printf ("%s: group %s is not multicast\n" , __func__, ip6_sprintf(&mcaddr)); } while (0) | |||
3034 | __func__, ip6_sprintf(&mcaddr)))do { if (mld_debug) printf ("%s: group %s is not multicast\n" , __func__, ip6_sprintf(&mcaddr)); } while (0); | |||
3035 | ifnet_head_done(); | |||
3036 | return (EINVAL22); | |||
3037 | } | |||
3038 | ||||
3039 | ifp = ifindex2ifnet[ifindex]; | |||
3040 | ifnet_head_done(); | |||
3041 | if (ifp == NULL((void *)0)) { | |||
3042 | MLD_PRINTF(("%s: no ifp for ifindex %u\n", __func__, ifindex))do { if (mld_debug) printf ("%s: no ifp for ifindex %u\n", __func__ , ifindex); } while (0); | |||
3043 | return (ENOENT2); | |||
3044 | } | |||
3045 | /* | |||
3046 | * Internal MLD lookups require that scope/zone ID is set. | |||
3047 | */ | |||
3048 | (void)in6_setscope(&mcaddr, ifp, NULL((void *)0)); | |||
3049 | ||||
3050 | in6_multihead_lock_shared(); | |||
3051 | IN6_FIRST_MULTI(step, inm)do { in6_multihead_lock_assert(0x03); (step).i_in6m = in6_multihead .lh_first; do { in6_multihead_lock_assert(0x03); if ((((inm)) = ((step)).i_in6m) != ((void *)0)) ((step)).i_in6m = ((step) ).i_in6m->in6m_entry.le_next; } while (0); } while (0); | |||
3052 | while (inm != NULL((void *)0)) { | |||
3053 | IN6M_LOCK(inm)lck_mtx_lock(&(inm)->in6m_lock); | |||
3054 | if (inm->in6m_ifp != ifp) | |||
3055 | goto next; | |||
3056 | ||||
3057 | if (!IN6_ARE_ADDR_EQUAL(&inm->in6m_addr, &mcaddr)(bcmp(&(&inm->in6m_addr)->__u6_addr.__u6_addr8[ 0], &(&mcaddr)->__u6_addr.__u6_addr8[0], sizeof (struct in6_addr)) == 0)) | |||
3058 | goto next; | |||
3059 | ||||
3060 | fmode = inm->in6m_st[1].iss_fmode; | |||
3061 | retval = SYSCTL_OUT(req, &fmode, sizeof(uint32_t))(req->oldfunc)(req, &fmode, sizeof(uint32_t)); | |||
3062 | if (retval != 0) { | |||
3063 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
3064 | break; /* abort */ | |||
3065 | } | |||
3066 | RB_FOREACH(ims, ip6_msource_tree, &inm->in6m_srcs)for ((ims) = ip6_msource_tree_RB_MINMAX(&inm->in6m_srcs , -1); (ims) != ((void *)0); (ims) = ip6_msource_tree_RB_NEXT (ims)) { | |||
3067 | MLD_PRINTF(("%s: visit node 0x%llx\n", __func__,do { if (mld_debug) printf ("%s: visit node 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0) | |||
3068 | (uint64_t)VM_KERNEL_ADDRPERM(ims)))do { if (mld_debug) printf ("%s: visit node 0x%llx\n", __func__ , (uint64_t)(((vm_offset_t)(ims) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(ims) + vm_kernel_addrperm)); } while (0); | |||
3069 | /* | |||
3070 | * Only copy-out sources which are in-mode. | |||
3071 | */ | |||
3072 | if (fmode != im6s_get_mode(inm, ims, 1)) { | |||
3073 | MLD_PRINTF(("%s: skip non-in-mode\n",do { if (mld_debug) printf ("%s: skip non-in-mode\n", __func__ ); } while (0) | |||
3074 | __func__))do { if (mld_debug) printf ("%s: skip non-in-mode\n", __func__ ); } while (0); | |||
3075 | continue; /* process next source */ | |||
3076 | } | |||
3077 | src = ims->im6s_addr; | |||
3078 | retval = SYSCTL_OUT(req, &src, sizeof(struct in6_addr))(req->oldfunc)(req, &src, sizeof(struct in6_addr)); | |||
3079 | if (retval != 0) | |||
3080 | break; /* process next inm */ | |||
3081 | } | |||
3082 | next: | |||
3083 | IN6M_UNLOCK(inm)lck_mtx_unlock(&(inm)->in6m_lock); | |||
3084 | IN6_NEXT_MULTI(step, inm)do { in6_multihead_lock_assert(0x03); if (((inm) = (step).i_in6m ) != ((void *)0)) (step).i_in6m = (step).i_in6m->in6m_entry .le_next; } while (0); | |||
3085 | } | |||
3086 | in6_multihead_lock_done(); | |||
3087 | ||||
3088 | return (retval); | |||
3089 | } | |||
3090 | ||||
3091 | void | |||
3092 | in6_multi_init(void) | |||
3093 | { | |||
3094 | PE_parse_boot_argn("ifa_debug", &in6m_debug, sizeof (in6m_debug)); | |||
3095 | ||||
3096 | /* Setup lock group and attribute for in6_multihead */ | |||
3097 | in6_multihead_lock_grp_attr = lck_grp_attr_alloc_init(); | |||
3098 | in6_multihead_lock_grp = lck_grp_alloc_init("in6_multihead", | |||
3099 | in6_multihead_lock_grp_attr); | |||
3100 | in6_multihead_lock_attr = lck_attr_alloc_init(); | |||
3101 | lck_rw_init(&in6_multihead_lock, in6_multihead_lock_grp, | |||
3102 | in6_multihead_lock_attr); | |||
3103 | ||||
3104 | lck_mtx_init(&in6m_trash_lock, in6_multihead_lock_grp, | |||
3105 | in6_multihead_lock_attr); | |||
3106 | TAILQ_INIT(&in6m_trash_head)do { (((&in6m_trash_head))->tqh_first) = ((void *)0); ( &in6m_trash_head)->tqh_last = &(((&in6m_trash_head ))->tqh_first); ; } while (0); | |||
3107 | ||||
3108 | in6m_size = (in6m_debug == 0) ? sizeof (struct in6_multi) : | |||
3109 | sizeof (struct in6_multi_dbg); | |||
3110 | in6m_zone = zinit(in6m_size, IN6M_ZONE_MAX64 * in6m_size, | |||
3111 | 0, IN6M_ZONE_NAME"in6_multi"); | |||
3112 | if (in6m_zone == NULL((void *)0)) { | |||
3113 | panic("%s: failed allocating %s", __func__, IN6M_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3113", __func__, "in6_multi"); | |||
3114 | /* NOTREACHED */ | |||
3115 | } | |||
3116 | zone_change(in6m_zone, Z_EXPAND3, TRUE1); | |||
3117 | ||||
3118 | imm_size = sizeof (struct in6_multi_mship); | |||
3119 | imm_zone = zinit(imm_size, IMM_ZONE_MAX64 * imm_size, 0, IMM_ZONE_NAME"in6_multi_mship"); | |||
3120 | if (imm_zone == NULL((void *)0)) { | |||
3121 | panic("%s: failed allocating %s", __func__, IMM_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3121", __func__, "in6_multi_mship"); | |||
3122 | /* NOTREACHED */ | |||
3123 | } | |||
3124 | zone_change(imm_zone, Z_EXPAND3, TRUE1); | |||
3125 | ||||
3126 | ip6ms_size = sizeof (struct ip6_msource); | |||
3127 | ip6ms_zone = zinit(ip6ms_size, IP6MS_ZONE_MAX64 * ip6ms_size, | |||
3128 | 0, IP6MS_ZONE_NAME"ip6_msource"); | |||
3129 | if (ip6ms_zone == NULL((void *)0)) { | |||
3130 | panic("%s: failed allocating %s", __func__, IP6MS_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3130", __func__, "ip6_msource"); | |||
3131 | /* NOTREACHED */ | |||
3132 | } | |||
3133 | zone_change(ip6ms_zone, Z_EXPAND3, TRUE1); | |||
3134 | ||||
3135 | in6ms_size = sizeof (struct in6_msource); | |||
3136 | in6ms_zone = zinit(in6ms_size, IN6MS_ZONE_MAX64 * in6ms_size, | |||
3137 | 0, IN6MS_ZONE_NAME"in6_msource"); | |||
3138 | if (in6ms_zone == NULL((void *)0)) { | |||
3139 | panic("%s: failed allocating %s", __func__, IN6MS_ZONE_NAME)(panic)("\"%s: failed allocating %s\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3139", __func__, "in6_msource"); | |||
3140 | /* NOTREACHED */ | |||
3141 | } | |||
3142 | zone_change(in6ms_zone, Z_EXPAND3, TRUE1); | |||
3143 | } | |||
3144 | ||||
3145 | static struct in6_multi * | |||
3146 | in6_multi_alloc(int how) | |||
3147 | { | |||
3148 | struct in6_multi *in6m; | |||
3149 | ||||
3150 | in6m = (how == M_WAITOK0x0000) ? zalloc(in6m_zone) : | |||
3151 | zalloc_noblock(in6m_zone); | |||
3152 | if (in6m != NULL((void *)0)) { | |||
3153 | bzero(in6m, in6m_size); | |||
3154 | lck_mtx_init(&in6m->in6m_lock, in6_multihead_lock_grp, | |||
3155 | in6_multihead_lock_attr); | |||
3156 | in6m->in6m_debug |= IFD_ALLOC0x2; | |||
3157 | if (in6m_debug != 0) { | |||
3158 | in6m->in6m_debug |= IFD_DEBUG0x4; | |||
3159 | in6m->in6m_trace = in6m_trace; | |||
3160 | } | |||
3161 | } | |||
3162 | return (in6m); | |||
3163 | } | |||
3164 | ||||
3165 | static void | |||
3166 | in6_multi_free(struct in6_multi *in6m) | |||
3167 | { | |||
3168 | IN6M_LOCK(in6m)lck_mtx_lock(&(in6m)->in6m_lock); | |||
3169 | if (in6m->in6m_debug & IFD_ATTACHED0x1) { | |||
3170 | panic("%s: attached in6m=%p is being freed", __func__, in6m)(panic)("\"%s: attached in6m=%p is being freed\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3170", __func__, in6m); | |||
3171 | /* NOTREACHED */ | |||
3172 | } else if (in6m->in6m_ifma != NULL((void *)0)) { | |||
3173 | panic("%s: ifma not NULL for in6m=%p", __func__, in6m)(panic)("\"%s: ifma not NULL for in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3173", __func__, in6m); | |||
3174 | /* NOTREACHED */ | |||
3175 | } else if (!(in6m->in6m_debug & IFD_ALLOC0x2)) { | |||
3176 | panic("%s: in6m %p cannot be freed", __func__, in6m)(panic)("\"%s: in6m %p cannot be freed\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3176", __func__, in6m); | |||
3177 | /* NOTREACHED */ | |||
3178 | } else if (in6m->in6m_refcount != 0) { | |||
3179 | panic("%s: non-zero refcount in6m=%p", __func__, in6m)(panic)("\"%s: non-zero refcount in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3179", __func__, in6m); | |||
3180 | /* NOTREACHED */ | |||
3181 | } else if (in6m->in6m_reqcnt != 0) { | |||
3182 | panic("%s: non-zero reqcnt in6m=%p", __func__, in6m)(panic)("\"%s: non-zero reqcnt in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3182", __func__, in6m); | |||
3183 | /* NOTREACHED */ | |||
3184 | } | |||
3185 | ||||
3186 | /* Free any pending MLDv2 state-change records */ | |||
3187 | IF_DRAIN(&in6m->in6m_scq)do { struct mbuf *_m; for (;;) { do { (_m) = (&in6m->in6m_scq )->ifq_head; if (_m != ((void *)0)) { if (((&in6m-> in6m_scq)->ifq_head = (_m)->m_hdr.mh_nextpkt) == ((void *)0)) (&in6m->in6m_scq)->ifq_tail = ((void *)0); ( _m)->m_hdr.mh_nextpkt = ((void *)0); (&in6m->in6m_scq )->ifq_len--; } } while (0); if (_m == ((void *)0)) break; m_freem(_m); } } while (0); | |||
3188 | ||||
3189 | in6m->in6m_debug &= ~IFD_ALLOC0x2; | |||
3190 | if ((in6m->in6m_debug & (IFD_DEBUG0x4 | IFD_TRASHED0x10)) == | |||
3191 | (IFD_DEBUG0x4 | IFD_TRASHED0x10)) { | |||
3192 | lck_mtx_lock(&in6m_trash_lock); | |||
3193 | TAILQ_REMOVE(&in6m_trash_head, (struct in6_multi_dbg *)in6m,do { if ((((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next)) != ((void *)0)) ((((struct in6_multi_dbg *)in6m)) ->in6m_trash_link.tqe_next)->in6m_trash_link.tqe_prev = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; else { (&in6m_trash_head)->tqh_last = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; ; } *((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev = ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next); ; ; ; } while (0) | |||
3194 | in6m_trash_link)do { if ((((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next)) != ((void *)0)) ((((struct in6_multi_dbg *)in6m)) ->in6m_trash_link.tqe_next)->in6m_trash_link.tqe_prev = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; else { (&in6m_trash_head)->tqh_last = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; ; } *((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev = ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next); ; ; ; } while (0); | |||
3195 | lck_mtx_unlock(&in6m_trash_lock); | |||
3196 | in6m->in6m_debug &= ~IFD_TRASHED0x10; | |||
3197 | } | |||
3198 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3199 | ||||
3200 | lck_mtx_destroy(&in6m->in6m_lock, in6_multihead_lock_grp); | |||
3201 | zfree(in6m_zone, in6m); | |||
3202 | } | |||
3203 | ||||
3204 | static void | |||
3205 | in6_multi_attach(struct in6_multi *in6m) | |||
3206 | { | |||
3207 | in6_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE0x02); | |||
3208 | IN6M_LOCK_ASSERT_HELD(in6m)lck_mtx_assert(&(in6m)->in6m_lock, 1); | |||
3209 | ||||
3210 | if (in6m->in6m_debug & IFD_ATTACHED0x1) { | |||
3211 | panic("%s: Attempt to attach an already attached in6m=%p",(panic)("\"%s: Attempt to attach an already attached in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3212", __func__, in6m) | |||
3212 | __func__, in6m)(panic)("\"%s: Attempt to attach an already attached in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3212", __func__, in6m); | |||
3213 | /* NOTREACHED */ | |||
3214 | } else if (in6m->in6m_debug & IFD_TRASHED0x10) { | |||
3215 | panic("%s: Attempt to reattach a detached in6m=%p",(panic)("\"%s: Attempt to reattach a detached in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3216", __func__, in6m) | |||
3216 | __func__, in6m)(panic)("\"%s: Attempt to reattach a detached in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3216", __func__, in6m); | |||
3217 | /* NOTREACHED */ | |||
3218 | } | |||
3219 | ||||
3220 | in6m->in6m_reqcnt++; | |||
3221 | VERIFY(in6m->in6m_reqcnt == 1)((void)(__builtin_expect(!!((long)((in6m->in6m_reqcnt == 1 ))), 1L) || assfail("in6m->in6m_reqcnt == 1", "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" , 3221))); | |||
3222 | IN6M_ADDREF_LOCKED(in6m)in6m_addref(in6m, 1); | |||
3223 | in6m->in6m_debug |= IFD_ATTACHED0x1; | |||
3224 | /* | |||
3225 | * Reattach case: If debugging is enabled, take it | |||
3226 | * out of the trash list and clear IFD_TRASHED. | |||
3227 | */ | |||
3228 | if ((in6m->in6m_debug & (IFD_DEBUG0x4 | IFD_TRASHED0x10)) == | |||
3229 | (IFD_DEBUG0x4 | IFD_TRASHED0x10)) { | |||
3230 | /* Become a regular mutex, just in case */ | |||
3231 | IN6M_CONVERT_LOCK(in6m)do { lck_mtx_assert(&(in6m)->in6m_lock, 1); lck_mtx_convert_spin (&(in6m)->in6m_lock); } while (0); | |||
3232 | lck_mtx_lock(&in6m_trash_lock); | |||
3233 | TAILQ_REMOVE(&in6m_trash_head, (struct in6_multi_dbg *)in6m,do { if ((((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next)) != ((void *)0)) ((((struct in6_multi_dbg *)in6m)) ->in6m_trash_link.tqe_next)->in6m_trash_link.tqe_prev = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; else { (&in6m_trash_head)->tqh_last = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; ; } *((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev = ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next); ; ; ; } while (0) | |||
3234 | in6m_trash_link)do { if ((((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next)) != ((void *)0)) ((((struct in6_multi_dbg *)in6m)) ->in6m_trash_link.tqe_next)->in6m_trash_link.tqe_prev = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; else { (&in6m_trash_head)->tqh_last = ((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev; ; } *((struct in6_multi_dbg *)in6m)->in6m_trash_link.tqe_prev = ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next); ; ; ; } while (0); | |||
3235 | lck_mtx_unlock(&in6m_trash_lock); | |||
3236 | in6m->in6m_debug &= ~IFD_TRASHED0x10; | |||
3237 | } | |||
3238 | ||||
3239 | LIST_INSERT_HEAD(&in6_multihead, in6m, in6m_entry)do { ; if (((((in6m))->in6m_entry.le_next) = (((&in6_multihead ))->lh_first)) != ((void *)0)) (((&in6_multihead))-> lh_first)->in6m_entry.le_prev = &(((in6m))->in6m_entry .le_next); (((&in6_multihead))->lh_first) = (in6m); (in6m )->in6m_entry.le_prev = &(((&in6_multihead))->lh_first ); } while (0); | |||
3240 | } | |||
3241 | ||||
3242 | int | |||
3243 | in6_multi_detach(struct in6_multi *in6m) | |||
3244 | { | |||
3245 | in6_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE0x02); | |||
3246 | IN6M_LOCK_ASSERT_HELD(in6m)lck_mtx_assert(&(in6m)->in6m_lock, 1); | |||
3247 | ||||
3248 | if (in6m->in6m_reqcnt == 0) { | |||
3249 | panic("%s: in6m=%p negative reqcnt", __func__, in6m)(panic)("\"%s: in6m=%p negative reqcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3249", __func__, in6m); | |||
3250 | /* NOTREACHED */ | |||
3251 | } | |||
3252 | ||||
3253 | --in6m->in6m_reqcnt; | |||
3254 | if (in6m->in6m_reqcnt > 0) | |||
3255 | return (0); | |||
3256 | ||||
3257 | if (!(in6m->in6m_debug & IFD_ATTACHED0x1)) { | |||
3258 | panic("%s: Attempt to detach an unattached record in6m=%p",(panic)("\"%s: Attempt to detach an unattached record in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3259", __func__, in6m) | |||
3259 | __func__, in6m)(panic)("\"%s: Attempt to detach an unattached record in6m=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3259", __func__, in6m); | |||
3260 | /* NOTREACHED */ | |||
3261 | } else if (in6m->in6m_debug & IFD_TRASHED0x10) { | |||
3262 | panic("%s: in6m %p is already in trash list", __func__, in6m)(panic)("\"%s: in6m %p is already in trash list\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3262", __func__, in6m); | |||
3263 | /* NOTREACHED */ | |||
3264 | } | |||
3265 | ||||
3266 | /* | |||
3267 | * NOTE: Caller calls IFMA_REMREF | |||
3268 | */ | |||
3269 | in6m->in6m_debug &= ~IFD_ATTACHED0x1; | |||
3270 | LIST_REMOVE(in6m, in6m_entry)do { ; ; if ((((in6m))->in6m_entry.le_next) != ((void *)0) ) (((in6m))->in6m_entry.le_next)->in6m_entry.le_prev = ( in6m)->in6m_entry.le_prev; *(in6m)->in6m_entry.le_prev = (((in6m))->in6m_entry.le_next); ; ; } while (0); | |||
3271 | ||||
3272 | if (in6m->in6m_debug & IFD_DEBUG0x4) { | |||
3273 | /* Become a regular mutex, just in case */ | |||
3274 | IN6M_CONVERT_LOCK(in6m)do { lck_mtx_assert(&(in6m)->in6m_lock, 1); lck_mtx_convert_spin (&(in6m)->in6m_lock); } while (0); | |||
3275 | lck_mtx_lock(&in6m_trash_lock); | |||
3276 | TAILQ_INSERT_TAIL(&in6m_trash_head,do { ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next ) = ((void *)0); ((struct in6_multi_dbg *)in6m)->in6m_trash_link .tqe_prev = (&in6m_trash_head)->tqh_last; *(&in6m_trash_head )->tqh_last = ((struct in6_multi_dbg *)in6m); (&in6m_trash_head )->tqh_last = &((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next); ; ; } while (0) | |||
3277 | (struct in6_multi_dbg *)in6m, in6m_trash_link)do { ((((struct in6_multi_dbg *)in6m))->in6m_trash_link.tqe_next ) = ((void *)0); ((struct in6_multi_dbg *)in6m)->in6m_trash_link .tqe_prev = (&in6m_trash_head)->tqh_last; *(&in6m_trash_head )->tqh_last = ((struct in6_multi_dbg *)in6m); (&in6m_trash_head )->tqh_last = &((((struct in6_multi_dbg *)in6m))->in6m_trash_link .tqe_next); ; ; } while (0); | |||
3278 | lck_mtx_unlock(&in6m_trash_lock); | |||
3279 | in6m->in6m_debug |= IFD_TRASHED0x10; | |||
3280 | } | |||
3281 | ||||
3282 | return (1); | |||
3283 | } | |||
3284 | ||||
3285 | void | |||
3286 | in6m_addref(struct in6_multi *in6m, int locked) | |||
3287 | { | |||
3288 | if (!locked) | |||
3289 | IN6M_LOCK_SPIN(in6m)lck_mtx_lock_spin(&(in6m)->in6m_lock); | |||
3290 | else | |||
3291 | IN6M_LOCK_ASSERT_HELD(in6m)lck_mtx_assert(&(in6m)->in6m_lock, 1); | |||
3292 | ||||
3293 | if (++in6m->in6m_refcount == 0) { | |||
3294 | panic("%s: in6m=%p wraparound refcnt", __func__, in6m)(panic)("\"%s: in6m=%p wraparound refcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3294", __func__, in6m); | |||
3295 | /* NOTREACHED */ | |||
3296 | } else if (in6m->in6m_trace != NULL((void *)0)) { | |||
3297 | (*in6m->in6m_trace)(in6m, TRUE1); | |||
3298 | } | |||
3299 | if (!locked) | |||
3300 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3301 | } | |||
3302 | ||||
3303 | void | |||
3304 | in6m_remref(struct in6_multi *in6m, int locked) | |||
3305 | { | |||
3306 | struct ifmultiaddr *ifma; | |||
3307 | struct mld_ifinfo *mli; | |||
3308 | ||||
3309 | if (!locked) | |||
3310 | IN6M_LOCK_SPIN(in6m)lck_mtx_lock_spin(&(in6m)->in6m_lock); | |||
3311 | else | |||
3312 | IN6M_LOCK_ASSERT_HELD(in6m)lck_mtx_assert(&(in6m)->in6m_lock, 1); | |||
3313 | ||||
3314 | if (in6m->in6m_refcount == 0 || (in6m->in6m_refcount == 1 && locked)) { | |||
3315 | panic("%s: in6m=%p negative refcnt", __func__, in6m)(panic)("\"%s: in6m=%p negative refcnt\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3315", __func__, in6m); | |||
3316 | /* NOTREACHED */ | |||
3317 | } else if (in6m->in6m_trace != NULL((void *)0)) { | |||
3318 | (*in6m->in6m_trace)(in6m, FALSE0); | |||
3319 | } | |||
3320 | ||||
3321 | --in6m->in6m_refcount; | |||
3322 | if (in6m->in6m_refcount > 0) { | |||
3323 | if (!locked) | |||
3324 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3325 | return; | |||
3326 | } | |||
3327 | ||||
3328 | /* | |||
3329 | * Synchronization with in6_mc_get(). In the event the in6m has been | |||
3330 | * detached, the underlying ifma would still be in the if_multiaddrs | |||
3331 | * list, and thus can be looked up via if_addmulti(). At that point, | |||
3332 | * the only way to find this in6m is via ifma_protospec. To avoid | |||
3333 | * race conditions between the last in6m_remref() of that in6m and its | |||
3334 | * use via ifma_protospec, in6_multihead lock is used for serialization. | |||
3335 | * In order to avoid violating the lock order, we must drop in6m_lock | |||
3336 | * before acquiring in6_multihead lock. To prevent the in6m from being | |||
3337 | * freed prematurely, we hold an extra reference. | |||
3338 | */ | |||
3339 | ++in6m->in6m_refcount; | |||
3340 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3341 | in6_multihead_lock_shared(); | |||
3342 | IN6M_LOCK_SPIN(in6m)lck_mtx_lock_spin(&(in6m)->in6m_lock); | |||
3343 | --in6m->in6m_refcount; | |||
3344 | if (in6m->in6m_refcount > 0) { | |||
3345 | /* We've lost the race, so abort since in6m is still in use */ | |||
3346 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3347 | in6_multihead_lock_done(); | |||
3348 | /* If it was locked, return it as such */ | |||
3349 | if (locked) | |||
3350 | IN6M_LOCK(in6m)lck_mtx_lock(&(in6m)->in6m_lock); | |||
3351 | return; | |||
3352 | } | |||
3353 | in6m_purge(in6m); | |||
3354 | ifma = in6m->in6m_ifma; | |||
3355 | in6m->in6m_ifma = NULL((void *)0); | |||
3356 | in6m->in6m_ifp = NULL((void *)0); | |||
3357 | mli = in6m->in6m_mli; | |||
3358 | in6m->in6m_mli = NULL((void *)0); | |||
3359 | IN6M_UNLOCK(in6m)lck_mtx_unlock(&(in6m)->in6m_lock); | |||
3360 | IFMA_LOCK_SPIN(ifma)lck_mtx_lock_spin(&(ifma)->ifma_lock); | |||
3361 | ifma->ifma_protospec = NULL((void *)0); | |||
3362 | IFMA_UNLOCK(ifma)lck_mtx_unlock(&(ifma)->ifma_lock); | |||
3363 | in6_multihead_lock_done(); | |||
3364 | ||||
3365 | in6_multi_free(in6m); | |||
3366 | if_delmulti_ifma(ifma); | |||
3367 | /* Release reference held to the underlying ifmultiaddr */ | |||
3368 | IFMA_REMREF(ifma)ifma_remref(ifma); | |||
3369 | ||||
3370 | if (mli != NULL((void *)0)) | |||
3371 | MLI_REMREF(mli)mli_remref(mli); | |||
3372 | } | |||
3373 | ||||
3374 | static void | |||
3375 | in6m_trace(struct in6_multi *in6m, int refhold) | |||
3376 | { | |||
3377 | struct in6_multi_dbg *in6m_dbg = (struct in6_multi_dbg *)in6m; | |||
3378 | ctrace_t *tr; | |||
3379 | u_int32_t idx; | |||
3380 | u_int16_t *cnt; | |||
3381 | ||||
3382 | if (!(in6m->in6m_debug & IFD_DEBUG0x4)) { | |||
3383 | panic("%s: in6m %p has no debug structure", __func__, in6m)(panic)("\"%s: in6m %p has no debug structure\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3383", __func__, in6m); | |||
3384 | /* NOTREACHED */ | |||
3385 | } | |||
3386 | if (refhold) { | |||
3387 | cnt = &in6m_dbg->in6m_refhold_cnt; | |||
3388 | tr = in6m_dbg->in6m_refhold; | |||
3389 | } else { | |||
3390 | cnt = &in6m_dbg->in6m_refrele_cnt; | |||
3391 | tr = in6m_dbg->in6m_refrele; | |||
3392 | } | |||
3393 | ||||
3394 | idx = atomic_add_16_ov(cnt, 1)((u_int16_t) OSAddAtomic16(1, (volatile SInt16 *)cnt)) % IN6M_TRACE_HIST_SIZE32; | |||
3395 | ctrace_record(&tr[idx]); | |||
3396 | } | |||
3397 | ||||
3398 | static struct in6_multi_mship * | |||
3399 | in6_multi_mship_alloc(int how) | |||
3400 | { | |||
3401 | struct in6_multi_mship *imm; | |||
3402 | ||||
3403 | imm = (how == M_WAITOK0x0000) ? zalloc(imm_zone) : zalloc_noblock(imm_zone); | |||
3404 | if (imm != NULL((void *)0)) | |||
3405 | bzero(imm, imm_size); | |||
3406 | ||||
3407 | return (imm); | |||
3408 | } | |||
3409 | ||||
3410 | static void | |||
3411 | in6_multi_mship_free(struct in6_multi_mship *imm) | |||
3412 | { | |||
3413 | if (imm->i6mm_maddr != NULL((void *)0)) { | |||
3414 | panic("%s: i6mm_maddr not NULL for imm=%p", __func__, imm)(panic)("\"%s: i6mm_maddr not NULL for imm=%p\"" "@" "/Users/vlad/tmp/xnu-3789.41.3/bsd/netinet6/in6_mcast.c" ":" "3414", __func__, imm); | |||
3415 | /* NOTREACHED */ | |||
3416 | } | |||
3417 | zfree(imm_zone, imm); | |||
3418 | } | |||
3419 | ||||
3420 | void | |||
3421 | in6_multihead_lock_exclusive(void) | |||
3422 | { | |||
3423 | lck_rw_lock_exclusive(&in6_multihead_lock); | |||
3424 | } | |||
3425 | ||||
3426 | void | |||
3427 | in6_multihead_lock_shared(void) | |||
3428 | { | |||
3429 | lck_rw_lock_shared(&in6_multihead_lock); | |||
3430 | } | |||
3431 | ||||
3432 | void | |||
3433 | in6_multihead_lock_assert(int what) | |||
3434 | { | |||
3435 | lck_rw_assert(&in6_multihead_lock, what); | |||
3436 | } | |||
3437 | ||||
3438 | void | |||
3439 | in6_multihead_lock_done(void) | |||
3440 | { | |||
3441 | lck_rw_done(&in6_multihead_lock); | |||
3442 | } | |||
3443 | ||||
3444 | static struct ip6_msource * | |||
3445 | ip6ms_alloc(int how) | |||
3446 | { | |||
3447 | struct ip6_msource *i6ms; | |||
3448 | ||||
3449 | i6ms = (how == M_WAITOK0x0000) ? zalloc(ip6ms_zone) : | |||
3450 | zalloc_noblock(ip6ms_zone); | |||
3451 | if (i6ms != NULL((void *)0)) | |||
3452 | bzero(i6ms, ip6ms_size); | |||
3453 | ||||
3454 | return (i6ms); | |||
3455 | } | |||
3456 | ||||
3457 | static void | |||
3458 | ip6ms_free(struct ip6_msource *i6ms) | |||
3459 | { | |||
3460 | zfree(ip6ms_zone, i6ms); | |||
3461 | } | |||
3462 | ||||
3463 | static struct in6_msource * | |||
3464 | in6ms_alloc(int how) | |||
3465 | { | |||
3466 | struct in6_msource *in6ms; | |||
3467 | ||||
3468 | in6ms = (how == M_WAITOK0x0000) ? zalloc(in6ms_zone) : | |||
3469 | zalloc_noblock(in6ms_zone); | |||
3470 | if (in6ms != NULL((void *)0)) | |||
3471 | bzero(in6ms, in6ms_size); | |||
3472 | ||||
3473 | return (in6ms); | |||
3474 | } | |||
3475 | ||||
3476 | static void | |||
3477 | in6ms_free(struct in6_msource *in6ms) | |||
3478 | { | |||
3479 | zfree(in6ms_zone, in6ms); | |||
3480 | } | |||
3481 | ||||
3482 | #ifdef MLD_DEBUG1 | |||
3483 | ||||
3484 | static const char *in6m_modestrs[] = { "un\n", "in", "ex" }; | |||
3485 | ||||
3486 | static const char * | |||
3487 | in6m_mode_str(const int mode) | |||
3488 | { | |||
3489 | if (mode >= MCAST_UNDEFINED0 && mode <= MCAST_EXCLUDE2) | |||
3490 | return (in6m_modestrs[mode]); | |||
3491 | return ("??"); | |||
3492 | } | |||
3493 | ||||
3494 | static const char *in6m_statestrs[] = { | |||
3495 | "not-member\n", | |||
3496 | "silent\n", | |||
3497 | "reporting\n", | |||
3498 | "idle\n", | |||
3499 | "lazy\n", | |||
3500 | "sleeping\n", | |||
3501 | "awakening\n", | |||
3502 | "query-pending\n", | |||
3503 | "sg-query-pending\n", | |||
3504 | "leaving" | |||
3505 | }; | |||
3506 | ||||
3507 | static const char * | |||
3508 | in6m_state_str(const int state) | |||
3509 | { | |||
3510 | if (state >= MLD_NOT_MEMBER0 && state <= MLD_LEAVING_MEMBER9) | |||
3511 | return (in6m_statestrs[state]); | |||
3512 | return ("??"); | |||
3513 | } | |||
3514 | ||||
3515 | /* | |||
3516 | * Dump an in6_multi structure to the console. | |||
3517 | */ | |||
3518 | void | |||
3519 | in6m_print(const struct in6_multi *inm) | |||
3520 | { | |||
3521 | int t; | |||
3522 | ||||
3523 | IN6M_LOCK_ASSERT_HELD(__DECONST(struct in6_multi *, inm))lck_mtx_assert(&((struct in6_multi *) (long)(inm))->in6m_lock , 1); | |||
3524 | ||||
3525 | if (mld_debug == 0) | |||
3526 | return; | |||
3527 | ||||
3528 | printf("%s: --- begin in6m 0x%llx ---\n", __func__, | |||
3529 | (uint64_t)VM_KERNEL_ADDRPERM(inm)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t) (inm) + vm_kernel_addrperm)); | |||
3530 | printf("addr %s ifp 0x%llx(%s) ifma 0x%llx\n", | |||
3531 | ip6_sprintf(&inm->in6m_addr), | |||
3532 | (uint64_t)VM_KERNEL_ADDRPERM(inm->in6m_ifp)(((vm_offset_t)(inm->in6m_ifp) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm->in6m_ifp) + vm_kernel_addrperm), | |||
3533 | if_name(inm->in6m_ifp)inm->in6m_ifp->if_xname, | |||
3534 | (uint64_t)VM_KERNEL_ADDRPERM(inm->in6m_ifma)(((vm_offset_t)(inm->in6m_ifma) == 0) ? (vm_offset_t)(0) : (vm_offset_t)(inm->in6m_ifma) + vm_kernel_addrperm)); | |||
3535 | printf("timer %u state %s refcount %u scq.len %u\n", | |||
3536 | inm->in6m_timer, | |||
3537 | in6m_state_str(inm->in6m_state), | |||
3538 | inm->in6m_refcount, | |||
3539 | inm->in6m_scq.ifq_len); | |||
3540 | printf("mli 0x%llx nsrc %lu sctimer %u scrv %u\n", | |||
3541 | (uint64_t)VM_KERNEL_ADDRPERM(inm->in6m_mli)(((vm_offset_t)(inm->in6m_mli) == 0) ? (vm_offset_t)(0) : ( vm_offset_t)(inm->in6m_mli) + vm_kernel_addrperm), | |||
3542 | inm->in6m_nsrc, | |||
3543 | inm->in6m_sctimer, | |||
3544 | inm->in6m_scrv); | |||
3545 | for (t = 0; t < 2; t++) { | |||
3546 | printf("t%d: fmode %s asm %u ex %u in %u rec %u\n", t, | |||
3547 | in6m_mode_str(inm->in6m_st[t].iss_fmode), | |||
3548 | inm->in6m_st[t].iss_asm, | |||
3549 | inm->in6m_st[t].iss_ex, | |||
3550 | inm->in6m_st[t].iss_in, | |||
3551 | inm->in6m_st[t].iss_rec); | |||
3552 | } | |||
3553 | printf("%s: --- end in6m 0x%llx ---\n", __func__, | |||
3554 | (uint64_t)VM_KERNEL_ADDRPERM(inm)(((vm_offset_t)(inm) == 0) ? (vm_offset_t)(0) : (vm_offset_t) (inm) + vm_kernel_addrperm)); | |||
3555 | } | |||
3556 | ||||
3557 | #else | |||
3558 | ||||
3559 | void | |||
3560 | in6m_print(__unused__attribute__((unused)) const struct in6_multi *inm) | |||
3561 | { | |||
3562 | ||||
3563 | } | |||
3564 | ||||
3565 | #endif |