From 9030e7c44aa75345336673c0252974ead4eb8364 Mon Sep 17 00:00:00 2001 From: Ulrich Drepper Date: Fri, 6 Aug 2004 09:25:59 +0000 Subject: Update. 2004-07-30 Guido Guenther * nss/getent.c (passwd_keys): Use strtoul instead of isdigit to test if the key is numeric or not. (group_keys): Likewise. --- sysdeps/unix/sysv/linux/getsourcefilter.c | 86 ++++++++++++++++++++++++++++--- 1 file changed, 78 insertions(+), 8 deletions(-) (limited to 'sysdeps/unix/sysv/linux/getsourcefilter.c') diff --git a/sysdeps/unix/sysv/linux/getsourcefilter.c b/sysdeps/unix/sysv/linux/getsourcefilter.c index 43936c896b..738c19809e 100644 --- a/sysdeps/unix/sysv/linux/getsourcefilter.c +++ b/sysdeps/unix/sysv/linux/getsourcefilter.c @@ -19,13 +19,74 @@ 02111-1307 USA. */ #include +#include #include #include #include +#include +#include #include +#include +#include +#include +#include #include +static const struct +{ + int sol; + int af; + socklen_t size; +} sol_map[] = + { + /* Sort the array according to importance of the protocols. Add + more protocols when they become available. */ + { SOL_IP, AF_INET, sizeof (struct sockaddr_in) }, + { SOL_IPV6, AF_INET6, sizeof (struct sockaddr_in6) }, + { SOL_AX25, AF_AX25, sizeof (struct sockaddr_ax25) }, + { SOL_IPX, AF_IPX, sizeof (struct sockaddr_ipx) }, + { SOL_ATALK, AF_APPLETALK, sizeof (struct sockaddr_at) }, + { SOL_ROSE, AF_ROSE, sizeof (struct sockaddr_rose) }, + { SOL_PACKET, AF_PACKET, sizeof (struct sockaddr_ll) } + }; +#define NSOL_MAP (sizeof (sol_map) / sizeof (sol_map[0])) + + +/* Try to determine the socket level value. Ideally both side and + family are set. But sometimes only the size is correct and the + family value might be bogus. Loop over the array entries and look + for a perfect match or the first match based on size. */ +int +__get_sol (int af, socklen_t len) +{ + int first_size_sol = -1; + + for (size_t cnt = 0; cnt < NSOL_MAP; ++cnt) + { + /* Just a test so that we make sure the special value used to + signal the "we have so far no socket level value" is OK. */ + assert (sol_map[cnt].sol != -1); + + if (len == sol_map[cnt].size) + { + /* The size matches, which is a requirement. If the family + matches, too, we have a winner. Otherwise we remember the + socket level value for this protocol if it is the first + match. */ + if (af == sol_map[cnt].af) + /* Bingo! */ + return sol_map[cnt].sol; + + if (first_size_sol == -1) + first_size_sol = sol_map[cnt].sol; + } + } + + return first_size_sol; +} + + int getsourcefilter (int s, uint32_t interface, struct sockaddr *group, socklen_t grouplen, uint32_t *fmode, uint32_t *numsrc, @@ -34,34 +95,43 @@ getsourcefilter (int s, uint32_t interface, struct sockaddr *group, /* We have to create an struct ip_msfilter object which we can pass to the kernel. */ socklen_t needed = GROUP_FILTER_SIZE (*numsrc); - int use_malloc = __libc_use_alloca (needed); + int use_alloca = __libc_use_alloca (needed); struct group_filter *gf; - if (use_malloc) + if (use_alloca) + gf = (struct group_filter *) alloca (needed); + else { gf = (struct group_filter *) malloc (needed); if (gf == NULL) return -1; } - else - gf = (struct group_filter *) alloca (needed); gf->gf_interface = interface; memcpy (&gf->gf_group, group, grouplen); + gf->gf_numsrc = *numsrc; - int result = __getsockopt (s, SOL_IP, MCAST_MSFILTER, gf, &needed); + /* We need to provide the appropriate socket level value. */ + int sol = __get_sol (group->sa_family, grouplen); + if (sol == -1) + { + __set_errno (EINVAL); + return -1; + } + + int result = __getsockopt (s, sol, MCAST_MSFILTER, gf, &needed); /* If successful, copy the results to the places the caller wants them in. */ if (result == 0) { *fmode = gf->gf_fmode; - *numsrc = gf->gf_numsrc; memcpy (slist, gf->gf_slist, - gf->gf_numsrc * sizeof (struct sockaddr_storage)); + MIN (*numsrc, gf->gf_numsrc) * sizeof (struct sockaddr_storage)); + *numsrc = gf->gf_numsrc; } - if (use_malloc) + if (! use_alloca) { int save_errno = errno; free (gf); -- cgit 1.4.1