2015-01-14 23:10:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* net/icmpv6/icmpv6_input.c
|
|
|
|
* Handling incoming ICMPv6 input
|
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2021-09-18 00:12:48 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <nuttx/net/netconfig.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/netstats.h>
|
2015-02-04 22:43:54 +01:00
|
|
|
#include <nuttx/net/icmpv6.h>
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#include "devif/devif.h"
|
2015-01-17 16:27:05 +01:00
|
|
|
#include "neighbor/neighbor.h"
|
2015-02-04 22:43:54 +01:00
|
|
|
#include "utils/utils.h"
|
2015-01-14 23:10:38 +01:00
|
|
|
#include "icmpv6/icmpv6.h"
|
2018-10-31 21:10:19 +01:00
|
|
|
#include "mld/mld.h"
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ICMPv6
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
#define IPv6BUF ((FAR struct ipv6_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev)])
|
2018-11-05 15:56:07 +01:00
|
|
|
#define ICMPv6BUF ((FAR struct icmpv6_hdr_s *) \
|
2018-11-10 18:29:02 +01:00
|
|
|
(&dev->d_buf[NET_LL_HDRLEN(dev)] + iplen))
|
2018-11-02 19:06:57 +01:00
|
|
|
#define ICMPv6REPLY ((FAR struct icmpv6_echo_reply_s *)icmpv6)
|
2018-11-05 15:56:07 +01:00
|
|
|
#define ICMPv6SIZE ((dev)->d_len - iplen)
|
2018-11-02 19:06:57 +01:00
|
|
|
|
2022-01-17 23:09:14 +01:00
|
|
|
#define ICMPv6SOLICIT ((FAR struct icmpv6_neighbor_solicit_s *)icmpv6)
|
|
|
|
#define ICMPv6ADVERTISE ((FAR struct icmpv6_neighbor_advertise_s *)icmpv6)
|
|
|
|
#define ICMPv6RADVERTISE ((FAR struct icmpv6_router_advertise_s *)icmpv6)
|
2018-11-02 19:06:57 +01:00
|
|
|
|
|
|
|
#define MLDQUERY ((FAR struct mld_mcast_listen_query_s *)icmpv6)
|
|
|
|
#define MLDREPORT_V1 ((FAR struct mld_mcast_listen_report_v1_s *)icmpv6)
|
|
|
|
#define MLDREPORT_V2 ((FAR struct mld_mcast_listen_report_v2_s *)icmpv6)
|
2018-11-07 17:39:51 +01:00
|
|
|
#define MLDDONE ((FAR struct mld_mcast_listen_done_s *)icmpv6)
|
2018-10-31 21:10:19 +01:00
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_datahandler
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle ICMPv6 echo replies that are not accepted by the application.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - Device instance only the input packet in d_buf, length = d_len;
|
|
|
|
* conn - A pointer to the ICMPv6 connection structure
|
|
|
|
* buffer - A pointer to the buffer to be copied to the read-ahead
|
|
|
|
* buffers
|
|
|
|
* buflen - The number of bytes to copy to the read-ahead buffer.
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2017-10-24 19:23:08 +02:00
|
|
|
* The number of bytes actually buffered is returned. This will be either
|
|
|
|
* zero or equal to buflen; partial packets are not buffered.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ICMPv6_SOCKET
|
|
|
|
static uint16_t icmpv6_datahandler(FAR struct net_driver_s *dev,
|
2018-11-09 18:08:51 +01:00
|
|
|
FAR struct icmpv6_conn_s *conn,
|
|
|
|
unsigned int iplen)
|
2017-10-24 19:23:08 +02:00
|
|
|
{
|
|
|
|
FAR struct ipv6_hdr_s *ipv6;
|
2018-11-09 18:44:01 +01:00
|
|
|
FAR struct icmpv6_hdr_s *icmpv6;
|
2017-10-24 19:23:08 +02:00
|
|
|
FAR struct iob_s *iob;
|
2018-11-09 18:44:01 +01:00
|
|
|
struct sockaddr_in6 inaddr;
|
2017-10-24 19:23:08 +02:00
|
|
|
uint16_t offset;
|
|
|
|
uint16_t buflen;
|
|
|
|
uint8_t addrsize;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Try to allocate on I/O buffer to start the chain without waiting (and
|
|
|
|
* throttling as necessary). If we would have to wait, then drop the
|
|
|
|
* packet.
|
|
|
|
*/
|
|
|
|
|
2019-08-17 00:42:25 +02:00
|
|
|
iob = iob_tryalloc(true, IOBUSER_NET_SOCK_ICMPv6);
|
2017-10-24 19:23:08 +02:00
|
|
|
if (iob == NULL)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Failed to create new I/O buffer chain\n");
|
2018-01-01 18:15:21 +01:00
|
|
|
goto drop;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Put the IPv6 address at the beginning of the read-ahead buffer */
|
|
|
|
|
|
|
|
ipv6 = IPv6BUF;
|
|
|
|
inaddr.sin6_family = AF_INET6;
|
|
|
|
inaddr.sin6_port = 0;
|
|
|
|
net_ipv6addr_copy(inaddr.sin6_addr.s6_addr16, ipv6->srcipaddr);
|
|
|
|
|
|
|
|
/* Copy the src address info into the I/O buffer chain. We will not wait
|
|
|
|
* for an I/O buffer to become available in this context. It there is
|
|
|
|
* any failure to allocated, the entire I/O buffer chain will be discarded.
|
|
|
|
*/
|
|
|
|
|
|
|
|
addrsize = sizeof(struct sockaddr_in6);
|
2019-08-17 00:42:25 +02:00
|
|
|
ret = iob_trycopyin(iob, &addrsize, sizeof(uint8_t), 0, true,
|
|
|
|
IOBUSER_NET_SOCK_ICMPv6);
|
2017-10-24 19:23:08 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* On a failure, iob_trycopyin return a negated error value but does
|
|
|
|
* not free any I/O buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
nerr("ERROR: Failed to length to the I/O buffer chain: %d\n", ret);
|
2018-01-01 18:15:21 +01:00
|
|
|
goto drop_with_chain;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
offset = sizeof(uint8_t);
|
|
|
|
|
|
|
|
ret = iob_trycopyin(iob, (FAR const uint8_t *)&inaddr,
|
2019-08-17 00:42:25 +02:00
|
|
|
sizeof(struct sockaddr_in6), offset, true,
|
|
|
|
IOBUSER_NET_SOCK_ICMPv6);
|
2017-10-24 19:23:08 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* On a failure, iob_trycopyin return a negated error value but does
|
|
|
|
* not free any I/O buffers.
|
|
|
|
*/
|
|
|
|
|
2021-02-19 15:01:46 +01:00
|
|
|
nerr("ERROR: Failed to source address to the I/O buffer chain: %d\n",
|
|
|
|
ret);
|
2018-01-01 18:15:21 +01:00
|
|
|
goto drop_with_chain;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
offset += sizeof(struct sockaddr_in6);
|
|
|
|
|
|
|
|
/* Copy the new ICMPv6 reply into the I/O buffer chain (without waiting) */
|
|
|
|
|
|
|
|
buflen = ICMPv6SIZE;
|
2018-11-09 18:44:01 +01:00
|
|
|
icmpv6 = ICMPv6BUF;
|
|
|
|
|
2019-08-17 00:42:25 +02:00
|
|
|
ret = iob_trycopyin(iob, (FAR uint8_t *)ICMPv6REPLY, buflen, offset, true,
|
|
|
|
IOBUSER_NET_SOCK_ICMPv6);
|
2017-10-24 19:23:08 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* On a failure, iob_copyin return a negated error value but does
|
|
|
|
* not free any I/O buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
nerr("ERROR: Failed to add data to the I/O buffer chain: %d\n", ret);
|
2018-01-01 18:15:21 +01:00
|
|
|
goto drop_with_chain;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Add the new I/O buffer chain to the tail of the read-ahead queue (again
|
|
|
|
* without waiting).
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = iob_tryadd_queue(iob, &conn->readahead);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Failed to queue the I/O buffer chain: %d\n", ret);
|
2018-01-01 18:15:21 +01:00
|
|
|
goto drop_with_chain;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ninfo("Buffered %d bytes\n", buflen + addrsize + 1);
|
2018-01-01 18:15:21 +01:00
|
|
|
dev->d_len = 0;
|
2017-10-24 19:23:08 +02:00
|
|
|
return buflen;
|
2018-01-01 18:15:21 +01:00
|
|
|
|
|
|
|
drop_with_chain:
|
2020-01-02 17:49:34 +01:00
|
|
|
iob_free_chain(iob, IOBUSER_NET_SOCK_ICMPv6);
|
2018-01-01 18:15:21 +01:00
|
|
|
|
|
|
|
drop:
|
|
|
|
dev->d_len = 0;
|
|
|
|
return 0;
|
2017-10-24 19:23:08 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-01-14 23:10:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: icmpv6_input
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming ICMPv6 input
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-11-05 15:56:07 +01:00
|
|
|
* dev - The device driver structure containing the received ICMPv6
|
|
|
|
* packet
|
|
|
|
* iplen - The size of the IPv6 header. This may be larger than
|
|
|
|
* IPv6_HDRLEN the IPv6 header if IPv6 extension headers are
|
|
|
|
* present.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-14 23:10:38 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 23:08:38 +02:00
|
|
|
* The network is locked.
|
2015-01-14 23:10:38 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2018-11-05 15:56:07 +01:00
|
|
|
void icmpv6_input(FAR struct net_driver_s *dev, unsigned int iplen)
|
2015-01-14 23:10:38 +01:00
|
|
|
{
|
2018-11-02 19:06:57 +01:00
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
2018-11-05 15:56:07 +01:00
|
|
|
FAR struct icmpv6_hdr_s *icmpv6 = ICMPv6BUF;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.recv++;
|
|
|
|
#endif
|
|
|
|
|
2018-11-01 14:52:32 +01:00
|
|
|
/* REVISIT:
|
|
|
|
* - Verify that the message length is valid.
|
|
|
|
* - Verify the ICMPv6 checksum
|
|
|
|
*/
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Handle the ICMPv6 message by its type */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
switch (icmpv6->type)
|
2015-01-14 23:10:38 +01:00
|
|
|
{
|
2015-02-03 20:25:28 +01:00
|
|
|
/* If we get a neighbor solicitation for our address we should send
|
|
|
|
* a neighbor advertisement message back.
|
|
|
|
*/
|
2015-01-20 18:06:51 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
case ICMPv6_NEIGHBOR_SOLICIT:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_neighbor_solicit_s *sol;
|
2015-01-19 21:57:55 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Check if we are the target of the solicitation */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
sol = ICMPv6SOLICIT;
|
|
|
|
if (net_ipv6addr_cmp(sol->tgtaddr, dev->d_ipv6addr))
|
|
|
|
{
|
2018-11-09 22:41:23 +01:00
|
|
|
if (sol->opttype == ICMPv6_OPT_SRCLLADDR)
|
|
|
|
{
|
|
|
|
/* Save the sender's address mapping in our Neighbor Table. */
|
|
|
|
|
2018-11-09 23:10:19 +01:00
|
|
|
neighbor_add(dev, ipv6->srcipaddr, sol->srclladdr);
|
2018-11-09 22:41:23 +01:00
|
|
|
}
|
|
|
|
|
2021-02-19 15:01:46 +01:00
|
|
|
/* Yes.. Send a neighbor advertisement back to where the neighbor
|
2015-02-03 20:25:28 +01:00
|
|
|
* solicitation came from.
|
|
|
|
*/
|
2015-01-20 18:06:51 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6_advertise(dev, ipv6->srcipaddr);
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-04 23:13:27 +01:00
|
|
|
/* All statistics have been updated. Nothing to do but exit. */
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2015-02-04 22:43:54 +01:00
|
|
|
return;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Check if we received a Neighbor Advertisement */
|
|
|
|
|
|
|
|
case ICMPv6_NEIGHBOR_ADVERTISE:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_neighbor_advertise_s *adv;
|
|
|
|
|
|
|
|
/* If the IPv6 destination address matches our address, and if so,
|
|
|
|
* add the neighbor address mapping to the list of neighbors.
|
|
|
|
*
|
|
|
|
* Missing checks:
|
|
|
|
* optlen = 1 (8 octets)
|
2021-02-19 15:01:46 +01:00
|
|
|
* Should only update Neighbor Table if
|
|
|
|
* [O]verride bit is set in flags
|
2015-02-03 20:25:28 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
adv = ICMPv6ADVERTISE;
|
2018-11-02 19:06:57 +01:00
|
|
|
if (net_ipv6addr_cmp(ipv6->destipaddr, dev->d_ipv6addr))
|
2015-02-03 20:25:28 +01:00
|
|
|
{
|
|
|
|
/* This message is required to support the Target link-layer
|
|
|
|
* address option.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (adv->opttype == ICMPv6_OPT_TGTLLADDR)
|
|
|
|
{
|
|
|
|
/* Save the sender's address mapping in our Neighbor Table. */
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
neighbor_add(dev, ipv6->srcipaddr, adv->tgtlladdr);
|
2018-11-09 22:41:23 +01:00
|
|
|
}
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-02 17:49:50 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_NEIGHBOR
|
2018-11-09 22:41:23 +01:00
|
|
|
/* Then notify any logic waiting for the Neighbor Advertisement */
|
2015-02-02 17:49:50 +01:00
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
icmpv6_notify(ipv6->srcipaddr);
|
2015-02-02 17:49:50 +01:00
|
|
|
#endif
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
/* We consumed the packet but we don't send anything in
|
|
|
|
* response.
|
|
|
|
*/
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
goto icmpv6_send_nothing;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
break;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-05 16:43:29 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_ROUTER
|
|
|
|
/* Check if we received a Router Solicitation */
|
|
|
|
|
|
|
|
case ICMPV6_ROUTER_SOLICIT:
|
|
|
|
{
|
|
|
|
/* Just give a knee-jerk Router Advertisement in respond with no
|
|
|
|
* further examination of the Router Solicitation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
icmpv6_radvertise(dev);
|
|
|
|
|
|
|
|
/* All statistics have been updated. Nothing to do but exit. */
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_AUTOCONF
|
|
|
|
/* Check if we received a Router Advertisement */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
case ICMPV6_ROUTER_ADVERTISE:
|
|
|
|
{
|
|
|
|
FAR struct icmpv6_router_advertise_s *adv;
|
2017-07-12 01:59:08 +02:00
|
|
|
FAR uint8_t *options;
|
2018-11-09 22:41:23 +01:00
|
|
|
bool prefix = false;
|
2015-02-03 20:25:28 +01:00
|
|
|
uint16_t pktlen;
|
|
|
|
uint16_t optlen;
|
|
|
|
int ndx;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Get the length of the option data */
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
pktlen = (uint16_t)ipv6->len[0] << 8 | ipv6->len[1];
|
2015-02-03 20:25:28 +01:00
|
|
|
if (pktlen <= ICMPv6_RADV_MINLEN)
|
|
|
|
{
|
|
|
|
/* Too small to contain any options */
|
|
|
|
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
|
|
|
|
optlen = ICMPv6_RADV_OPTLEN(pktlen);
|
|
|
|
|
|
|
|
/* We need to have a valid router advertisement with a Prefix and
|
2017-07-11 22:59:42 +02:00
|
|
|
* with the "A" bit set in the flags. Options immediately follow
|
|
|
|
* the ICMPv6 router advertisement.
|
2015-02-03 20:25:28 +01:00
|
|
|
*/
|
|
|
|
|
2017-07-11 22:59:42 +02:00
|
|
|
adv = ICMPv6RADVERTISE;
|
2021-02-19 15:01:46 +01:00
|
|
|
options = (FAR uint8_t *)adv +
|
|
|
|
sizeof(struct icmpv6_router_advertise_s);
|
2017-07-11 22:59:42 +02:00
|
|
|
|
2015-02-05 19:48:02 +01:00
|
|
|
for (ndx = 0; ndx + sizeof(struct icmpv6_prefixinfo_s) <= optlen; )
|
2015-02-03 20:25:28 +01:00
|
|
|
{
|
2017-08-08 06:36:44 +02:00
|
|
|
FAR struct icmpv6_srclladdr_s *sllopt =
|
|
|
|
(FAR struct icmpv6_srclladdr_s *)&options[ndx];
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
if (sllopt->opttype == ICMPv6_OPT_SRCLLADDR)
|
2017-08-08 06:36:44 +02:00
|
|
|
{
|
2018-11-02 19:06:57 +01:00
|
|
|
neighbor_add(dev, ipv6->srcipaddr, sllopt->srclladdr);
|
2017-08-08 06:36:44 +02:00
|
|
|
}
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
FAR struct icmpv6_prefixinfo_s *opt =
|
2017-07-11 22:59:42 +02:00
|
|
|
(FAR struct icmpv6_prefixinfo_s *)&options[ndx];
|
2015-02-03 20:25:28 +01:00
|
|
|
|
|
|
|
/* Is this the sought for prefix? Is it the correct size? Is
|
|
|
|
* the "A" flag set?
|
|
|
|
*/
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
if (opt->opttype == ICMPv6_OPT_PREFIX &&
|
2015-02-03 20:25:28 +01:00
|
|
|
(opt->flags & ICMPv6_PRFX_FLAG_A) != 0)
|
|
|
|
{
|
|
|
|
/* Yes.. Notify any waiting threads */
|
|
|
|
|
2021-02-19 15:01:46 +01:00
|
|
|
icmpv6_rnotify(dev, ipv6->srcipaddr,
|
|
|
|
opt->prefix, opt->preflen);
|
2018-11-09 22:41:23 +01:00
|
|
|
prefix = true;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Skip to the next option (units of octets) */
|
|
|
|
|
|
|
|
ndx += (opt->optlen << 3);
|
|
|
|
}
|
|
|
|
|
2018-11-09 22:41:23 +01:00
|
|
|
if (prefix)
|
|
|
|
{
|
|
|
|
goto icmpv6_send_nothing;
|
|
|
|
}
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Handle the ICMPv6 Echo Request */
|
|
|
|
|
|
|
|
case ICMPv6_ECHO_REQUEST:
|
|
|
|
{
|
|
|
|
/* ICMPv6 echo (i.e., ping) processing. This is simple, we only
|
|
|
|
* change the ICMPv6 type from ECHO to ECHO_REPLY and update the
|
|
|
|
* ICMPv6 checksum before we return the packet.
|
|
|
|
*/
|
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6->type = ICMPv6_ECHO_REPLY;
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
net_ipv6addr_copy(ipv6->destipaddr, ipv6->srcipaddr);
|
|
|
|
net_ipv6addr_copy(ipv6->srcipaddr, dev->d_ipv6addr);
|
2015-02-03 20:25:28 +01:00
|
|
|
|
2018-11-02 19:06:57 +01:00
|
|
|
icmpv6->chksum = 0;
|
2018-11-05 15:56:07 +01:00
|
|
|
icmpv6->chksum = ~icmpv6_chksum(dev, iplen);
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
break;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
#ifdef CONFIG_NET_ICMPv6_SOCKET
|
2015-02-03 20:25:28 +01:00
|
|
|
/* If an ICMPv6 echo reply is received then there should also be
|
|
|
|
* a thread waiting to received the echo response.
|
|
|
|
*/
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
case ICMPv6_ECHO_REPLY:
|
|
|
|
{
|
2019-03-19 16:43:32 +01:00
|
|
|
FAR struct icmpv6_echo_reply_s *reply;
|
|
|
|
FAR struct icmpv6_conn_s *conn;
|
2019-11-27 15:09:51 +01:00
|
|
|
uint16_t flags = ICMPv6_NEWDATA;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2019-03-19 16:43:32 +01:00
|
|
|
/* Nothing consumed the ICMP reply. That might be because this is
|
|
|
|
* an old, invalid reply or simply because the ping application
|
|
|
|
* has not yet put its poll or recv in place.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Is there any connection that might expect this reply? */
|
|
|
|
|
|
|
|
reply = ICMPv6REPLY;
|
|
|
|
conn = icmpv6_findconn(dev, reply->id);
|
|
|
|
if (conn == NULL)
|
|
|
|
{
|
|
|
|
/* No.. drop the packet */
|
|
|
|
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
/* Dispatch the ECHO reply to the waiting thread */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2022-02-07 04:37:39 +01:00
|
|
|
flags = devif_conn_event(dev, conn, flags, conn->sconn.list);
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2017-11-20 19:15:01 +01:00
|
|
|
/* Was the ECHO reply consumed by any waiting thread? */
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2019-11-27 15:09:51 +01:00
|
|
|
if ((flags & ICMPv6_NEWDATA) != 0)
|
2015-02-03 20:25:28 +01:00
|
|
|
{
|
2017-10-24 19:23:08 +02:00
|
|
|
uint16_t nbuffered;
|
2015-01-14 23:10:38 +01:00
|
|
|
|
2017-10-24 19:23:08 +02:00
|
|
|
/* Yes.. Add the ICMP echo reply to the IPPROTO_ICMP socket read
|
|
|
|
* ahead buffer.
|
|
|
|
*/
|
|
|
|
|
2018-11-09 18:08:51 +01:00
|
|
|
nbuffered = icmpv6_datahandler(dev, conn, iplen);
|
2017-10-24 19:23:08 +02:00
|
|
|
if (nbuffered == 0)
|
|
|
|
{
|
|
|
|
/* Could not buffer the data.. drop the packet */
|
|
|
|
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
2017-11-20 19:15:01 +01:00
|
|
|
|
|
|
|
goto icmpv6_send_nothing;
|
2015-02-03 20:25:28 +01:00
|
|
|
}
|
|
|
|
break;
|
2015-01-14 23:10:38 +01:00
|
|
|
#endif
|
|
|
|
|
2018-10-31 21:10:19 +01:00
|
|
|
#ifdef CONFIG_NET_MLD
|
|
|
|
/* Dispatch received Multicast Listener Discovery (MLD) packets. */
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_QUERY: /* Multicast Listener Query, RFC 2710 and RFC 3810 */
|
|
|
|
{
|
2018-11-01 14:52:32 +01:00
|
|
|
FAR struct mld_mcast_listen_query_s *query = MLDQUERY;
|
2018-10-31 21:10:19 +01:00
|
|
|
int ret;
|
|
|
|
|
Squashed commit of the following:
net/mld: The MLD logic now compiles and is much less toxic. It still is not a proper MLD implementation: (1) It is basically a port of IGMP, tweaked to work with IPv6 and ICMPv6 MLD messages, (2) it needs a proper analysis and comparison with RFC 3810, and (3) it is completely untested. For this reason, it will remain EXPERIMENTAL for some time.
net/mld: Add some missing macros, more fixes related to IPv6 vs IPv4 types,
net/mld: More compilation cleaning. Most fixups for IPv6 vs IPv4 types.
net/mld: Hook crudely converted .c files into build system and resolve a few of the many, many compilation/design problems.
net/mld: Add support for MLD statistics.
net/mld: Hook in MLD poll and packet transmission logic.
net/mld: Change references to IPv4 definitions to IPv6 definitions; Remove mld_input() since MLD piggybacks on ICMPv6 input. Add functions to catch MLD messages dispatched by ICMPv6 input logic.
net/mld: As a starting point, copy all net/igmp/*.c files to net/mld/. and change all occurrences of igmp (or IGMP) to mld (or MLD).
net/mld: More compilation cleaning. Most fixups for IPv6 vs IPv4 types.
net/mld: Hook crudely converted .c files into build system and resolve a few of the many, many compilation/design problems.
net/mld: Add support for MLD statistics.
net/mld: Hook in MLD poll and packet transmission logic.
net/mld: Change references to IPv4 definitions to IPv6 definitions; Remove mld_input() since MLD piggybacks on ICMPv6 input. Add functions to catch MLD messages dispatched by ICMPv6 input logic.
net/mld: As a starting point, copy all net/igmp/*.c files to net/mld/. and change all occurrences of igmp (or IGMP) to mld (or MLD).
2018-11-01 22:18:40 +01:00
|
|
|
ret = mld_query(dev, query);
|
2018-10-31 21:10:19 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_REPORT_V1: /* Version 1 Multicast Listener Report, RFC 2710 */
|
|
|
|
{
|
|
|
|
FAR struct mld_mcast_listen_report_v1_s *report = MLDREPORT_V1;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = mld_report_v1(dev, report);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMPV6_MCAST_LISTEN_REPORT_V2: /* Version 2 Multicast Listener Report, RFC 3810 */
|
|
|
|
{
|
|
|
|
FAR struct mld_mcast_listen_report_v2_s *report = MLDREPORT_V2;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = mld_report_v2(dev, report);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2018-11-07 17:39:51 +01:00
|
|
|
case ICMPV6_MCAST_LISTEN_DONE: /* Multicast Listener Done, RFC 2710 */
|
2018-10-31 21:10:19 +01:00
|
|
|
{
|
2018-11-07 17:39:51 +01:00
|
|
|
FAR struct mld_mcast_listen_done_s *done = MLDDONE;
|
2018-10-31 21:10:19 +01:00
|
|
|
int ret;
|
|
|
|
|
2018-11-07 17:39:51 +01:00
|
|
|
ret = mld_done(dev, done);
|
2018-10-31 21:10:19 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto icmpv6_drop_packet;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2015-02-03 20:25:28 +01:00
|
|
|
default:
|
|
|
|
{
|
2018-11-02 19:06:57 +01:00
|
|
|
nwarn("WARNING: Unknown ICMPv6 type: %d\n", icmpv6->type);
|
2015-02-03 20:25:28 +01:00
|
|
|
goto icmpv6_type_error;
|
|
|
|
}
|
2015-01-14 23:10:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
2018-11-04 17:57:21 +01:00
|
|
|
if (dev->d_len > 0)
|
|
|
|
{
|
|
|
|
ninfo("Outgoing ICMPv6 packet length: %d (%d)\n",
|
|
|
|
dev->d_len, (ipv6->len[0] << 8) | ipv6->len[1]);
|
|
|
|
|
|
|
|
g_netstats.icmpv6.sent++;
|
|
|
|
g_netstats.ipv6.sent++;
|
|
|
|
}
|
2015-01-14 23:10:38 +01:00
|
|
|
#endif
|
2018-11-04 17:57:21 +01:00
|
|
|
|
2015-01-14 23:10:38 +01:00
|
|
|
return;
|
|
|
|
|
2015-01-21 21:13:03 +01:00
|
|
|
icmpv6_type_error:
|
2015-01-14 23:10:38 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.typeerr++;
|
|
|
|
#endif
|
|
|
|
|
2015-01-21 21:13:03 +01:00
|
|
|
icmpv6_drop_packet:
|
2015-01-14 23:10:38 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmpv6.drop++;
|
|
|
|
#endif
|
2015-01-21 21:13:03 +01:00
|
|
|
|
2017-11-20 19:15:01 +01:00
|
|
|
icmpv6_send_nothing:
|
2015-01-14 23:10:38 +01:00
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_ICMPv6 */
|