2015-01-14 23:10:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* net/icmpv6/icmpv6_input.c
|
|
|
|
* Handling incoming ICMPv6 input
|
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <nuttx/net/netconfig.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/netstats.h>
|
2015-02-04 22:43:54 +01:00
|
|
|
#include <nuttx/net/icmpv6.h>
|
2023-03-15 06:52:18 +01:00
|
|
|
#include <nuttx/net/dns.h>
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#include "devif/devif.h"
|
2015-01-17 16:27:05 +01:00
|
|
|
#include "neighbor/neighbor.h"
|
2015-02-04 22:43:54 +01:00
|
|
|
#include "utils/utils.h"
|
2015-01-14 23:10:38 +01:00
|
|
|
#include "icmpv6/icmpv6.h"
|
2018-10-31 21:10:19 +01:00
|
|
|
#include "mld/mld.h"
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ICMPv6
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
#define ICMPv6REPLY ((FAR struct icmpv6_echo_reply_s *)icmpv6)
|
2018-11-05 15:56:07 +01:00
|
|
|
#define ICMPv6SIZE ((dev)->d_len - iplen)
|
2018-11-02 19:06:57 +01:00
|
|
|
|
2022-01-17 23:09:14 +01:00
|
|
|
#define ICMPv6SOLICIT ((FAR struct icmpv6_neighbor_solicit_s *)icmpv6)
|
|
|
|
#define ICMPv6ADVERTISE ((FAR struct icmpv6_neighbor_advertise_s *)icmpv6)
|
|
|
|
#define ICMPv6RADVERTISE ((FAR struct icmpv6_router_advertise_s *)icmpv6)
|
2018-11-02 19:06:57 +01:00
|
|
|
|
|
|
|
#define MLDQUERY ((FAR struct mld_mcast_listen_query_s *)icmpv6)
|
|
|
|
#define MLDREPORT_V1 ((FAR struct mld_mcast_listen_report_v1_s *)icmpv6)
|
|
|
|
#define MLDREPORT_V2 ((FAR struct mld_mcast_listen_report_v2_s *)icmpv6)
|
2018-11-07 17:39:51 +01:00
|
|
|
#define MLDDONE ((FAR struct mld_mcast_listen_done_s *)icmpv6)
|
2018-10-31 21:10:19 +01:00
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_SOCKET
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
struct icmpv6_deliver_s
|
|
|
|
{
|
|
|
|
FAR struct net_driver_s *dev; /* Current network device */
|
|
|
|
unsigned int iplen; /* The size of the IPv6 header */
|
|
|
|
bool delivered; /* Whether the message is delivered */
|
|
|
|
};
|
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
static bool icmpv6_filter(FAR const uint32_t *data, uint8_t type)
|
|
|
|
{
|
|
|
|
/* We require only the four bytes of the ICMPv6 header. */
|
|
|
|
|
|
|
|
DEBUGASSERT(data != NULL);
|
|
|
|
|
|
|
|
return (data[type >> 5] & (1u << (type & 31))) != 0;
|
|
|
|
}
|
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_datahandler
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle ICMPv6 echo replies that are not accepted by the application.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - Device instance only the input packet in d_buf, length = d_len;
|
|
|
|
* conn - A pointer to the ICMPv6 connection structure
|
|
|
|
* buffer - A pointer to the buffer to be copied to the read-ahead
|
|
|
|
* buffers
|
|
|
|
* buflen - The number of bytes to copy to the read-ahead buffer.
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2017-10-24 19:23:08 +02:00
|
|
|
* The number of bytes actually buffered is returned. This will be either
|
|
|
|
* zero or equal to buflen; partial packets are not buffered.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static uint16_t icmpv6_datahandler(FAR struct net_driver_s *dev,
|
2018-11-09 18:08:51 +01:00
|
|
|
FAR struct icmpv6_conn_s *conn,
|
|
|
|
unsigned int iplen)
|
2017-10-24 19:23:08 +02:00
|
|
|
{
|
|
|
|
FAR struct ipv6_hdr_s *ipv6;
|
2018-11-09 18:44:01 +01:00
|
|
|
struct sockaddr_in6 inaddr;
|
2022-11-23 12:39:40 +01:00
|
|
|
FAR struct iob_s *iob;
|
2023-04-14 12:11:12 +02:00
|
|
|
unsigned int offset;
|
2017-10-24 19:23:08 +02:00
|
|
|
uint16_t buflen;
|
|
|
|
int ret;
|
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
iob = iob_tryalloc(false);
|
|
|
|
if (iob == NULL)
|
|
|
|
{
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
/* Put the IPv6 address at the beginning of the read-ahead buffer */
|
|
|
|
|
|
|
|
ipv6 = IPv6BUF;
|
|
|
|
inaddr.sin6_family = AF_INET6;
|
|
|
|
inaddr.sin6_port = 0;
|
|
|
|
net_ipv6addr_copy(inaddr.sin6_addr.s6_addr16, ipv6->srcipaddr);
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
/* Copy the src address info into the front of I/O buffer chain which
|
|
|
|
* overwrites the contents of the packet header field.
|
2017-10-24 19:23:08 +02:00
|
|
|
*/
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
memcpy(iob->io_data, &inaddr, sizeof(struct sockaddr_in6));
|
2023-04-14 12:11:12 +02:00
|
|
|
offset = sizeof(struct sockaddr_in6);
|
2017-10-24 19:23:08 +02:00
|
|
|
|
2023-04-14 12:11:12 +02:00
|
|
|
iob->io_data[offset++] = ipv6->ttl;
|
|
|
|
|
|
|
|
iob_reserve(iob, offset);
|
2017-10-24 19:23:08 +02:00
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
/* Copy the ICMPv6 message into the I/O buffer chain (without waiting) */
|
2018-11-09 18:44:01 +01:00
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
ret = iob_clone_partial(dev->d_iob, dev->d_iob->io_pktlen,
|
|
|
|
iplen, iob, 0, true, false);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
iob_free_chain(iob);
|
|
|
|
return ret;
|
|
|
|
}
|
2017-10-24 19:23:08 +02:00
|
|
|
|
2023-04-23 05:25:28 +02:00
|
|
|
buflen = ICMPv6SIZE;
|
2017-10-24 19:23:08 +02:00
|
|
|
|
|
|
|
/* Add the new I/O buffer chain to the tail of the read-ahead queue (again
|
|
|
|
* without waiting).
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = iob_tryadd_queue(iob, &conn->readahead);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Failed to queue the I/O buffer chain: %d\n", ret);
|
2022-11-23 12:39:40 +01:00
|
|
|
iob_free_chain(iob);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ninfo("Buffered %d bytes\n", buflen);
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
return buflen;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
2023-04-23 05:25:28 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_delivery_callback
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the icmpv6 package to the application according to the filter
|
|
|
|
* conditions, but ICMPv6_ECHO_REPLY is a special message type, if there
|
|
|
|
* is an application waiting, it will also copy.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - A pointer to the ICMPv6 connection structure.
|
|
|
|
* arg - The context information
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int icmpv6_delivery_callback(FAR struct icmpv6_conn_s *conn,
|
|
|
|
FAR void *arg)
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_deliver_s *info = arg;
|
|
|
|
FAR struct net_driver_s *dev = info->dev;
|
|
|
|
FAR struct icmpv6_hdr_s *icmpv6 = IPBUF(info->iplen);
|
|
|
|
|
|
|
|
if (icmpv6_filter(conn->filter.icmp6_filt, icmpv6->type) &&
|
|
|
|
(icmpv6->type != ICMPv6_ECHO_REPLY || conn->id != ICMPv6REPLY->id ||
|
|
|
|
conn->dev != dev))
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
info->delivered = true;
|
|
|
|
if (devif_conn_event(dev, ICMPv6_NEWDATA, conn->sconn.list) !=
|
|
|
|
ICMPv6_NEWDATA)
|
|
|
|
{
|
|
|
|
dev->d_len = dev->d_iob->io_pktlen;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
icmpv6_datahandler(dev, conn, info->iplen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_deliver
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the icmpv6 package to the application according to the filter
|
|
|
|
* conditions, but ICMPv6_ECHO_REPLY is a special message type, if there
|
|
|
|
* is an application waiting, it will also copy.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - Reference to a device driver structure.
|
|
|
|
* iplen - The size of the IPv6 header. This may be larger than
|
|
|
|
* IPv6_HDRLEN the IPv6 header if IPv6 extension headers are
|
|
|
|
* present.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static bool icmpv6_deliver(FAR struct net_driver_s *dev, unsigned int iplen)
|
|
|
|
{
|
|
|
|
struct icmpv6_deliver_s info;
|
|
|
|
|
|
|
|
info.dev = dev;
|
|
|
|
info.iplen = iplen;
|
|
|
|
info.delivered = false;
|
|
|
|
|
|
|
|
icmpv6_foreach(icmpv6_delivery_callback, &info);
|
|
|
|
|
|
|
|
return info.delivered;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_ICMPv6_SOCKET */
|
2017-10-24 19:23:08 +02:00
|
|
|
|
2015-01-14 23:10:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_input
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming ICMPv6 input
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-11-05 15:56:07 +01:00
|
|
|
* dev - The device driver structure containing the received ICMPv6
|
|
|
|
* packet
|
|
|
|
* iplen - The size of the IPv6 header. This may be larger than
|
|
|
|
* IPv6_HDRLEN the IPv6 header if IPv6 extension headers are
|
|
|
|
* present.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-14 23:10:38 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 23:08:38 +02:00
|
|
|
* The network is locked.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2018-11-05 15:56:07 +01:00
|
|
|
void icmpv6_input(FAR struct net_driver_s *dev, unsigned int iplen)
|
2015-01-14 23:10:38 +01:00
|
|
|
{
|
2018-11-02 19:06:57 +01:00
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
2022-10-26 06:35:08 +02:00
|
|
|
FAR struct icmpv6_hdr_s *icmpv6 = IPBUF(iplen);
|
2023-04-23 05:25:28 +02:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_SOCKET
|
|
|
|
bool delivered = icmpv6_deliver(dev, iplen);
|
|
|
|
#endif
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.recv++;
|
|
|
|
#endif
|
|
|
|
|
2018-11-01 14:52:32 +01:00
|
|
|
/* REVISIT:
|
|
|
|
* - Verify that the message length is valid.
|
|
|
|
* - Verify the ICMPv6 checksum
|
|
|
|
*/
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Handle the ICMPv6 message by its type */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
switch (icmpv6->type)
|
2015-01-14 23:10:38 +01:00
|
|
|
{
|
2015-02-03 20:25:28 +01:00
|
|
|
/* If we get a neighbor solicitation for our address we should send
|
|
|
|
* a neighbor advertisement message back.
|
|
|
|
*/
|
2015-01-20 18:06:51 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
case ICMPv6_NEIGHBOR_SOLICIT:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_neighbor_solicit_s *sol;
|
2015-01-19 21:57:55 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Check if we are the target of the solicitation */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
sol = ICMPv6SOLICIT;
|
|
|
|
if (net_ipv6addr_cmp(sol->tgtaddr, dev->d_ipv6addr))
|
|
|
|
{
|
2018-11-09 22:41:23 +01:00
|
|
|
if (sol->opttype == ICMPv6_OPT_SRCLLADDR)
|
|
|
|
{
|
|
|
|
/* Save the sender's address mapping in our Neighbor Table. */
|
|
|
|
|
2018-11-09 23:10:19 +01:00
|
|
|
neighbor_add(dev, ipv6->srcipaddr, sol->srclladdr);
|
2018-11-09 22:41:23 +01:00
|
|
|
}
|
|
|
|
|
2021-02-19 15:01:46 +01:00
|
|
|
/* Yes.. Send a neighbor advertisement back to where the neighbor
|
2015-02-03 20:25:28 +01:00
|
|
|
* solicitation came from.
|
|
|
|
*/
|
2015-01-20 18:06:51 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6_advertise(dev, ipv6->srcipaddr);
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-04 23:13:27 +01:00
|
|
|
/* All statistics have been updated. Nothing to do but exit. */
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2015-02-04 22:43:54 +01:00
|
|
|
return;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Check if we received a Neighbor Advertisement */
|
|
|
|
|
|
|
|
case ICMPv6_NEIGHBOR_ADVERTISE:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_neighbor_advertise_s *adv;
|
|
|
|
|
|
|
|
/* If the IPv6 destination address matches our address, and if so,
|
|
|
|
* add the neighbor address mapping to the list of neighbors.
|
|
|
|
*
|
|
|
|
* Missing checks:
|
|
|
|
* optlen = 1 (8 octets)
|
2021-02-19 15:01:46 +01:00
|
|
|
* Should only update Neighbor Table if
|
|
|
|
* [O]verride bit is set in flags
|
2015-02-03 20:25:28 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
adv = ICMPv6ADVERTISE;
|
2018-11-02 19:06:57 +01:00
|
|
|
if (net_ipv6addr_cmp(ipv6->destipaddr, dev->d_ipv6addr))
|
2015-02-03 20:25:28 +01:00
|
|
|
{
|
|
|
|
/* This message is required to support the Target link-layer
|
|
|
|
* address option.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (adv->opttype == ICMPv6_OPT_TGTLLADDR)
|
|
|
|
{
|
|
|
|
/* Save the sender's address mapping in our Neighbor Table. */
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
neighbor_add(dev, ipv6->srcipaddr, adv->tgtlladdr);
|
2018-11-09 22:41:23 +01:00
|
|
|
}
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-02 17:49:50 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_NEIGHBOR
|
2018-11-09 22:41:23 +01:00
|
|
|
/* Then notify any logic waiting for the Neighbor Advertisement */
|
2015-02-02 17:49:50 +01:00
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
icmpv6_notify(ipv6->srcipaddr);
|
2015-02-02 17:49:50 +01:00
|
|
|
#endif
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
/* We consumed the packet but we don't send anything in
|
|
|
|
* response.
|
|
|
|
*/
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
goto icmpv6_send_nothing;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
break;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-05 16:43:29 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_ROUTER
|
|
|
|
/* Check if we received a Router Solicitation */
|
|
|
|
|
|
|
|
case ICMPV6_ROUTER_SOLICIT:
|
|
|
|
{
|
|
|
|
/* Just give a knee-jerk Router Advertisement in respond with no
|
|
|
|
* further examination of the Router Solicitation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
icmpv6_radvertise(dev);
|
|
|
|
|
|
|
|
/* All statistics have been updated. Nothing to do but exit. */
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_AUTOCONF
|
|
|
|
/* Check if we received a Router Advertisement */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
case ICMPV6_ROUTER_ADVERTISE:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_router_advertise_s *adv;
|
2017-07-12 01:59:08 +02:00
|
|
|
FAR uint8_t *options;
|
2018-11-09 22:41:23 +01:00
|
|
|
bool prefix = false;
|
2015-02-03 20:25:28 +01:00
|
|
|
uint16_t pktlen;
|
|
|
|
uint16_t optlen;
|
|
|
|
int ndx;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Get the length of the option data */
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
pktlen = (uint16_t)ipv6->len[0] << 8 | ipv6->len[1];
|
2015-02-03 20:25:28 +01:00
|
|
|
if (pktlen <= ICMPv6_RADV_MINLEN)
|
|
|
|
{
|
|
|
|
/* Too small to contain any options */
|
|
|
|
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
|
|
|
|
optlen = ICMPv6_RADV_OPTLEN(pktlen);
|
|
|
|
|
|
|
|
/* We need to have a valid router advertisement with a Prefix and
|
2017-07-11 22:59:42 +02:00
|
|
|
* with the "A" bit set in the flags. Options immediately follow
|
|
|
|
* the ICMPv6 router advertisement.
|
2015-02-03 20:25:28 +01:00
|
|
|
*/
|
|
|
|
|
2017-07-11 22:59:42 +02:00
|
|
|
adv = ICMPv6RADVERTISE;
|
2021-02-19 15:01:46 +01:00
|
|
|
options = (FAR uint8_t *)adv +
|
|
|
|
sizeof(struct icmpv6_router_advertise_s);
|
2017-07-11 22:59:42 +02:00
|
|
|
|
2022-12-14 09:42:00 +01:00
|
|
|
for (ndx = 0; ndx < optlen; )
|
2015-02-03 20:25:28 +01:00
|
|
|
{
|
2022-07-28 15:53:58 +02:00
|
|
|
FAR struct icmpv6_generic_s *opt =
|
|
|
|
(FAR struct icmpv6_generic_s *)&options[ndx];
|
2017-08-08 06:36:44 +02:00
|
|
|
|
2022-07-28 15:53:58 +02:00
|
|
|
switch (opt->opttype)
|
2017-08-08 06:36:44 +02:00
|
|
|
{
|
2022-07-28 15:53:58 +02:00
|
|
|
case ICMPv6_OPT_SRCLLADDR:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_srclladdr_s *sllopt =
|
|
|
|
(FAR struct icmpv6_srclladdr_s *)opt;
|
|
|
|
neighbor_add(dev, ipv6->srcipaddr, sllopt->srclladdr);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPv6_OPT_PREFIX:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_prefixinfo_s *prefixopt =
|
|
|
|
(FAR struct icmpv6_prefixinfo_s *)opt;
|
|
|
|
|
|
|
|
/* Is the "A" flag set? */
|
|
|
|
|
|
|
|
if ((prefixopt->flags & ICMPv6_PRFX_FLAG_A) != 0)
|
|
|
|
{
|
2022-07-29 13:22:27 +02:00
|
|
|
/* Yes.. Set the new network addresses. */
|
2022-07-28 15:53:58 +02:00
|
|
|
|
2022-07-29 13:22:27 +02:00
|
|
|
icmpv6_setaddresses(dev, ipv6->srcipaddr,
|
2022-07-28 15:53:58 +02:00
|
|
|
prefixopt->prefix, prefixopt->preflen);
|
2022-07-29 13:22:27 +02:00
|
|
|
|
|
|
|
/* Notify any waiting threads */
|
|
|
|
|
|
|
|
icmpv6_rnotify(dev);
|
2022-07-28 15:53:58 +02:00
|
|
|
prefix = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPv6_OPT_MTU:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_mtu_s *mtuopt =
|
|
|
|
(FAR struct icmpv6_mtu_s *)opt;
|
2023-01-04 10:48:34 +01:00
|
|
|
dev->d_pktsize = NTOHS(mtuopt->mtu[1]) + dev->d_llhdrlen;
|
2022-07-28 15:53:58 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2023-03-15 06:52:18 +01:00
|
|
|
#ifdef CONFIG_ICMPv6_AUTOCONF_RDNSS
|
|
|
|
case ICMPv6_OPT_RDNSS:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_rdnss_s *rdnss =
|
|
|
|
(FAR struct icmpv6_rdnss_s *)opt;
|
|
|
|
FAR struct in6_addr *servers;
|
|
|
|
struct sockaddr_in6 addr;
|
|
|
|
int nservers;
|
|
|
|
int ret;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (rdnss->optlen < 3)
|
|
|
|
{
|
|
|
|
nerr("rdnss error length %d\n", rdnss->optlen);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* optlen is in units of 8 bytes. The header is 1 unit
|
|
|
|
* (8 bytes) and each address is another 2 units
|
|
|
|
* (16 bytes). So the number of addresses is equal to
|
|
|
|
* (optlen - 1) / 2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
servers = (FAR struct in6_addr *)rdnss->servers;
|
|
|
|
nservers = (rdnss->optlen - 1) / 2;
|
|
|
|
|
|
|
|
/* Set the IPv6 DNS server address */
|
|
|
|
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sin6_family = AF_INET6;
|
|
|
|
|
|
|
|
for (i = 0; i < CONFIG_NETDB_DNSSERVER_NAMESERVERS &&
|
|
|
|
i < nservers; i++)
|
|
|
|
{
|
|
|
|
net_ipv6addr_copy(&addr.sin6_addr, servers + i);
|
|
|
|
ret = dns_add_nameserver(
|
|
|
|
(FAR const struct sockaddr *)&addr,
|
|
|
|
sizeof(struct sockaddr_in6));
|
|
|
|
if (ret < 0 && ret != -EEXIST)
|
|
|
|
{
|
|
|
|
nerr("dns add nameserver failed %d", ret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2022-07-28 15:53:58 +02:00
|
|
|
default:
|
|
|
|
break;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Skip to the next option (units of octets) */
|
|
|
|
|
|
|
|
ndx += (opt->optlen << 3);
|
|
|
|
}
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
if (prefix)
|
|
|
|
{
|
|
|
|
goto icmpv6_send_nothing;
|
|
|
|
}
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Handle the ICMPv6 Echo Request */
|
|
|
|
|
|
|
|
case ICMPv6_ECHO_REQUEST:
|
|
|
|
{
|
|
|
|
/* ICMPv6 echo (i.e., ping) processing. This is simple, we only
|
|
|
|
* change the ICMPv6 type from ECHO to ECHO_REPLY and update the
|
|
|
|
* ICMPv6 checksum before we return the packet.
|
|
|
|
*/
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6->type = ICMPv6_ECHO_REPLY;
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
net_ipv6addr_copy(ipv6->destipaddr, ipv6->srcipaddr);
|
|
|
|
net_ipv6addr_copy(ipv6->srcipaddr, dev->d_ipv6addr);
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6->chksum = 0;
|
2018-11-05 15:56:07 +01:00
|
|
|
icmpv6->chksum = ~icmpv6_chksum(dev, iplen);
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
break;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2023-05-11 13:32:30 +02:00
|
|
|
#if (CONFIG_NET_ICMPv6_PMTU_ENTRIES > 0)
|
|
|
|
case ICMPv6_PACKET_TOO_BIG:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_pmtu_entry *entry;
|
|
|
|
FAR struct ipv6_hdr_s *inner;
|
|
|
|
int mtu;
|
|
|
|
|
|
|
|
mtu = (ntohs(icmpv6->data[0]) << 16) | (ntohs(icmpv6->data[1]));
|
|
|
|
if (mtu <= 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_type_error;
|
|
|
|
}
|
|
|
|
|
|
|
|
inner = (FAR struct ipv6_hdr_s *)(icmpv6 + 1);
|
|
|
|
entry = icmpv6_find_pmtu_entry(inner->destipaddr);
|
|
|
|
if (entry == NULL)
|
|
|
|
{
|
|
|
|
icmpv6_add_pmtu_entry(inner->destipaddr, mtu);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
entry->pmtu = mtu;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto icmpv6_send_nothing;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-10-31 21:10:19 +01:00
|
|
|
#ifdef CONFIG_NET_MLD
|
|
|
|
/* Dispatch received Multicast Listener Discovery (MLD) packets. */
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_QUERY: /* Multicast Listener Query, RFC 2710 and RFC 3810 */
|
|
|
|
{
|
2018-11-01 14:52:32 +01:00
|
|
|
FAR struct mld_mcast_listen_query_s *query = MLDQUERY;
|
2018-10-31 21:10:19 +01:00
|
|
|
int ret;
|
|
|
|
|
Squashed commit of the following:
net/mld: The MLD logic now compiles and is much less toxic. It still is not a proper MLD implementation: (1) It is basically a port of IGMP, tweaked to work with IPv6 and ICMPv6 MLD messages, (2) it needs a proper analysis and comparison with RFC 3810, and (3) it is completely untested. For this reason, it will remain EXPERIMENTAL for some time.
net/mld: Add some missing macros, more fixes related to IPv6 vs IPv4 types,
net/mld: More compilation cleaning. Most fixups for IPv6 vs IPv4 types.
net/mld: Hook crudely converted .c files into build system and resolve a few of the many, many compilation/design problems.
net/mld: Add support for MLD statistics.
net/mld: Hook in MLD poll and packet transmission logic.
net/mld: Change references to IPv4 definitions to IPv6 definitions; Remove mld_input() since MLD piggybacks on ICMPv6 input. Add functions to catch MLD messages dispatched by ICMPv6 input logic.
net/mld: As a starting point, copy all net/igmp/*.c files to net/mld/. and change all occurrences of igmp (or IGMP) to mld (or MLD).
net/mld: More compilation cleaning. Most fixups for IPv6 vs IPv4 types.
net/mld: Hook crudely converted .c files into build system and resolve a few of the many, many compilation/design problems.
net/mld: Add support for MLD statistics.
net/mld: Hook in MLD poll and packet transmission logic.
net/mld: Change references to IPv4 definitions to IPv6 definitions; Remove mld_input() since MLD piggybacks on ICMPv6 input. Add functions to catch MLD messages dispatched by ICMPv6 input logic.
net/mld: As a starting point, copy all net/igmp/*.c files to net/mld/. and change all occurrences of igmp (or IGMP) to mld (or MLD).
2018-11-01 22:18:40 +01:00
|
|
|
ret = mld_query(dev, query);
|
2018-10-31 21:10:19 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_REPORT_V1: /* Version 1 Multicast Listener Report, RFC 2710 */
|
|
|
|
{
|
|
|
|
FAR struct mld_mcast_listen_report_v1_s *report = MLDREPORT_V1;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = mld_report_v1(dev, report);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_REPORT_V2: /* Version 2 Multicast Listener Report, RFC 3810 */
|
|
|
|
{
|
|
|
|
FAR struct mld_mcast_listen_report_v2_s *report = MLDREPORT_V2;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = mld_report_v2(dev, report);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2018-11-07 17:39:51 +01:00
|
|
|
case ICMPV6_MCAST_LISTEN_DONE: /* Multicast Listener Done, RFC 2710 */
|
2018-10-31 21:10:19 +01:00
|
|
|
{
|
2018-11-07 17:39:51 +01:00
|
|
|
FAR struct mld_mcast_listen_done_s *done = MLDDONE;
|
2018-10-31 21:10:19 +01:00
|
|
|
int ret;
|
|
|
|
|
2018-11-07 17:39:51 +01:00
|
|
|
ret = mld_done(dev, done);
|
2018-10-31 21:10:19 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
default:
|
|
|
|
{
|
2023-04-23 05:25:28 +02:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_SOCKET
|
|
|
|
if (delivered)
|
|
|
|
{
|
|
|
|
goto icmpv6_send_nothing;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
nwarn("WARNING: Unknown ICMPv6 type: %d\n", icmpv6->type);
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_type_error;
|
|
|
|
}
|
2015-01-14 23:10:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
2018-11-04 17:57:21 +01:00
|
|
|
if (dev->d_len > 0)
|
|
|
|
{
|
|
|
|
ninfo("Outgoing ICMPv6 packet length: %d (%d)\n",
|
|
|
|
dev->d_len, (ipv6->len[0] << 8) | ipv6->len[1]);
|
|
|
|
|
|
|
|
g_netstats.icmpv6.sent++;
|
|
|
|
g_netstats.ipv6.sent++;
|
|
|
|
}
|
2015-01-14 23:10:38 +01:00
|
|
|
#endif
|
2018-11-04 17:57:21 +01:00
|
|
|
|
2015-01-14 23:10:38 +01:00
|
|
|
return;
|
|
|
|
|
2015-01-21 21:13:03 +01:00
|
|
|
icmpv6_type_error:
|
2015-01-14 23:10:38 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.typeerr++;
|
|
|
|
#endif
|
|
|
|
|
2015-01-21 21:13:03 +01:00
|
|
|
icmpv6_drop_packet:
|
2015-01-14 23:10:38 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.drop++;
|
|
|
|
#endif
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2017-11-20 19:15:01 +01:00
|
|
|
icmpv6_send_nothing:
|
2015-01-14 23:10:38 +01:00
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_ICMPv6 */
|