svn commit: r221904 - head/sys/netinet
Bjoern A. Zeeb
bz at FreeBSD.org
Wed May 18 16:35:05 UTC 2011
On May 14, 2011, at 6:22 PM, Michael Tuexen wrote:
> Author: tuexen
> Date: Sat May 14 18:22:14 2011
> New Revision: 221904
> URL: http://svn.freebsd.org/changeset/base/221904
>
> Log:
> Fix the source address selection for boundall sockets
> when sending INITs to a global IPv4 address having
> only private IPv4 address.
> Allow the usage of a private address and make sure
> that no other private address will be used by the
> association.
> Initial work was done by rrs at .
>
> MFC after: 1 week.
>
> Modified:
> head/sys/netinet/sctp_output.c
> head/sys/netinet/sctp_output.h
>
> Modified: head/sys/netinet/sctp_output.c
> ==============================================================================
> --- head/sys/netinet/sctp_output.c Sat May 14 18:22:08 2011 (r221903)
> +++ head/sys/netinet/sctp_output.c Sat May 14 18:22:14 2011 (r221904)
...
> @@ -3068,19 +3112,81 @@ plan_d:
> * It is restricted for some
> * reason.. probably not yet added.
> */
> + sifa = NULL;
> continue;
> }
> }
> - atomic_add_int(&sifa->refcount, 1);
> - return (sifa);
> + goto out;
> }
> }
> - /*
> - * Ok we can find NO address to source from that is not on our
> - * restricted list and non_asoc_address is NOT ok, or it is on our
> - * restricted list. We can't source to it :-(
> - */
> - return (NULL);
> +#ifdef INET
> + if ((retried == 0) && (stcb->asoc.ipv4_local_scope == 0)) {
> + stcb->asoc.ipv4_local_scope = 1;
> + retried = 1;
> + goto again_with_private_addresses_allowed;
> + } else if (retried == 1) {
> + stcb->asoc.ipv4_local_scope = 0;
> + }
> +#endif
> +out:
> + if (sifa) {
> +#ifdef INET
either this needs to go outside the if() or ...
> + if (retried == 1) {
> + LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
> + if (dest_is_loop == 0 && SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
> + /* wrong base scope */
> + continue;
> + }
> + LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
> + struct sctp_ifa *tmp_sifa;
> +
> + if ((sctp_ifa->localifa_flags & SCTP_ADDR_DEFER_USE) &&
> + (non_asoc_addr_ok == 0))
> + continue;
> + tmp_sifa = sctp_is_ifa_addr_acceptable(sctp_ifa,
> + dest_is_loop,
> + dest_is_priv, fam);
> + if (tmp_sifa == NULL) {
> + continue;
> + }
> + if (tmp_sifa == sifa) {
> + continue;
> + }
> + if (stcb) {
> + if (sctp_is_address_in_scope(tmp_sifa,
> + stcb->asoc.ipv4_addr_legal,
> + stcb->asoc.ipv6_addr_legal,
> + stcb->asoc.loopback_scope,
> + stcb->asoc.ipv4_local_scope,
> + stcb->asoc.local_scope,
> + stcb->asoc.site_scope, 0) == 0) {
> + continue;
> + }
> + if (((non_asoc_addr_ok == 0) &&
> + (sctp_is_addr_restricted(stcb, tmp_sifa))) ||
> + (non_asoc_addr_ok &&
> + (sctp_is_addr_restricted(stcb, tmp_sifa)) &&
> + (!sctp_is_addr_pending(stcb, tmp_sifa)))) {
> + /*
> + * It is restricted
> + * for some reason..
> + * probably not yet
> + * added.
> + */
> + continue;
> + }
> + }
> + if ((tmp_sifa->address.sin.sin_family == AF_INET) &&
> + (IN4_ISPRIVATE_ADDRESS(&(tmp_sifa->address.sin.sin_addr)))) {
> + sctp_add_local_addr_restricted(stcb, tmp_sifa);
> + }
> + }
> + }
> + }
> + atomic_add_int(&sifa->refcount, 1);
> + }
> +#endif
... this needs to be inside the block. Either way will unbreak INET free kernels again.
> + return (sifa);
> }
--
Bjoern A. Zeeb You have to have visions!
Stop bit received. Insert coin for new address family.
More information about the svn-src-head
mailing list