summaryrefslogtreecommitdiffstats
path: root/sys/net/if_iso88025subr.c
diff options
context:
space:
mode:
authorkbyanc <kbyanc@FreeBSD.org>2002-05-07 22:14:06 +0000
committerkbyanc <kbyanc@FreeBSD.org>2002-05-07 22:14:06 +0000
commitcc607e6c2d164e9cb79d2fdec151a8c3a151be83 (patch)
tree1011805115056aee5a327edbdc2edbd88f8dd3e5 /sys/net/if_iso88025subr.c
parent890d39a38cddebc8d4ce58feba2c0be1ee5e44f6 (diff)
downloadFreeBSD-src-cc607e6c2d164e9cb79d2fdec151a8c3a151be83.zip
FreeBSD-src-cc607e6c2d164e9cb79d2fdec151a8c3a151be83.tar.gz
Move ISO88025 source routing information into sockaddr_dl's sdl_data
field. This returns the sdl_data field to a variable-length field. More importantly, this prevents a easily-reproduceable data-corruption bug when the interface name plus the hardware address exceed the sdl_data field's original 12 byte limit. However, token-ring interfaces may still overflow the new sdl_data field's 46 byte limit if the interface name exceeds 6 characters (since 6 characters for interface name plus 6 for hardware address plus 34 for source routing = the size of sdl_data). Further refinements could overcome this limitation but would break binary compatibility; this commit only addresses fixing the bug for commonly-occuring cases without breaking binary compatibility with the intention that the functionality can be MFC'ed to -stable. See message ID's (both send to -arch): 20020421013332.F87395-100000@gateway.posi.net 20020430181359.G11009-300000@gateway.posi.net for a more thorough description of the bug addressed and how to reproduce it. Approved by: silence on -arch and -net Sponsored by: NTT Multimedia Communications Labs MFC after: 1 week
Diffstat (limited to 'sys/net/if_iso88025subr.c')
-rw-r--r--sys/net/if_iso88025subr.c9
1 files changed, 5 insertions, 4 deletions
diff --git a/sys/net/if_iso88025subr.c b/sys/net/if_iso88025subr.c
index f23f5ee..afb6f4e 100644
--- a/sys/net/if_iso88025subr.c
+++ b/sys/net/if_iso88025subr.c
@@ -253,8 +253,8 @@ iso88025_output(ifp, m, dst, rt0)
/* Calculate routing info length based on arp table entry */
if (rt && (sdl = (struct sockaddr_dl *)rt->rt_gateway))
- if (sdl->sdl_rcf != NULL)
- rif_len = TR_RCF_RIFLEN(sdl->sdl_rcf);
+ if (SDL_ISO88025(sdl)->trld_rcf != NULL)
+ rif_len = TR_RCF_RIFLEN(SDL_ISO88025(sdl)->trld_rcf);
/* Generate a generic 802.5 header for the packet */
gen_th.ac = TR_AC;
@@ -264,9 +264,10 @@ iso88025_output(ifp, m, dst, rt0)
if (rif_len) {
gen_th.iso88025_shost[0] |= TR_RII;
if (rif_len > 2) {
- gen_th.rcf = sdl->sdl_rcf;
+ gen_th.rcf = SDL_ISO88025(sdl)->trld_rcf;
(void)memcpy((caddr_t)gen_th.rd,
- (caddr_t)sdl->sdl_route, rif_len - 2);
+ (caddr_t)SDL_ISO88025(sdl)->trld_route,
+ rif_len - 2);
}
}
OpenPOWER on IntegriCloud