📄 ndisc.c
字号:
if (ra_msg->icmph.icmp6_hop_limit) in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit; /* * Update Reachable Time and Retrans Timer */ if (in6_dev->nd_parms) { __u32 rtime = ntohl(ra_msg->retrans_timer); if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) { rtime = (rtime*HZ)/1000; if (rtime < HZ/10) rtime = HZ/10; in6_dev->nd_parms->retrans_time = rtime; } rtime = ntohl(ra_msg->reachable_time); if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) { rtime = (rtime*HZ)/1000; if (rtime < HZ/10) rtime = HZ/10; if (rtime != in6_dev->nd_parms->base_reachable_time) { in6_dev->nd_parms->base_reachable_time = rtime; in6_dev->nd_parms->gc_staletime = 3 * rtime; in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime); } } } /* * Process options. */ while (optlen > 0) { int len = (opt[1] << 3); if (len == 0) { ND_PRINTK0("RA: opt has 0 len\n"); break; } switch(*opt) { case ND_OPT_SOURCE_LL_ADDR: if (rt == NULL) break; if ((neigh = rt->rt6i_nexthop) != NULL && skb->dev->addr_len + 2 >= len) neigh_update(neigh, opt+2, NUD_STALE, 1, 1); break; case ND_OPT_PREFIX_INFO: addrconf_prefix_rcv(skb->dev, opt, len); break; case ND_OPT_MTU: { int mtu; mtu = htonl(*(__u32 *)(opt+4)); if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) { ND_PRINTK0("NDISC: router " "announcement with mtu = %d\n", mtu); break; } if (in6_dev->cnf.mtu6 != mtu) { in6_dev->cnf.mtu6 = mtu; if (rt) rt->u.dst.pmtu = mtu; rt6_mtu_change(skb->dev, mtu); } } break; case ND_OPT_TARGET_LL_ADDR: case ND_OPT_REDIRECT_HDR: ND_PRINTK0("got illegal option with RA"); break; default: ND_PRINTK0("unkown option in RA\n"); }; optlen -= len; opt += len; } if (rt) dst_release(&rt->u.dst); in6_dev_put(in6_dev);}static void ndisc_redirect_rcv(struct sk_buff *skb){ struct inet6_dev *in6_dev; struct icmp6hdr *icmph; struct in6_addr *dest; struct in6_addr *target; /* new first hop to destination */ struct neighbour *neigh; int on_link = 0; int optlen; if (!(ipv6_addr_type(&skb->nh.ipv6h->saddr) & IPV6_ADDR_LINKLOCAL)) { if (net_ratelimit()) printk(KERN_WARNING "ICMP redirect: source address is not linklocal\n"); return; } optlen = skb->tail - skb->h.raw; optlen -= sizeof(struct icmp6hdr) + 2 * sizeof(struct in6_addr); if (optlen < 0) { if (net_ratelimit()) printk(KERN_WARNING "ICMP redirect: packet too small\n"); return; } icmph = (struct icmp6hdr *) skb->h.raw; target = (struct in6_addr *) (icmph + 1); dest = target + 1; if (ipv6_addr_type(dest) & IPV6_ADDR_MULTICAST) { if (net_ratelimit()) printk(KERN_WARNING "ICMP redirect for multicast addr\n"); return; } if (ipv6_addr_cmp(dest, target) == 0) { on_link = 1; } else if (!(ipv6_addr_type(target) & IPV6_ADDR_LINKLOCAL)) { if (net_ratelimit()) printk(KERN_WARNING "ICMP redirect: target address is not linklocal\n"); return; } in6_dev = in6_dev_get(skb->dev); if (!in6_dev) return; if (in6_dev->cnf.forwarding || !in6_dev->cnf.accept_redirects) { in6_dev_put(in6_dev); return; } /* XXX: RFC2461 8.1: * The IP source address of the Redirect MUST be the same as the current * first-hop router for the specified ICMP Destination Address. */ /* passed validation tests */ /* We install redirect only if nexthop state is valid. */ neigh = __neigh_lookup(&nd_tbl, target, skb->dev, 1); if (neigh) { ndisc_update(neigh, (u8*)(dest + 1), optlen, ND_OPT_TARGET_LL_ADDR); if (neigh->nud_state&NUD_VALID) rt6_redirect(dest, &skb->nh.ipv6h->saddr, neigh, on_link); else __neigh_event_send(neigh, NULL); neigh_release(neigh); } in6_dev_put(in6_dev);}void ndisc_send_redirect(struct sk_buff *skb, struct neighbour *neigh, struct in6_addr *target){ struct sock *sk = ndisc_socket->sk; int len = sizeof(struct icmp6hdr) + 2 * sizeof(struct in6_addr); struct sk_buff *buff; struct icmp6hdr *icmph; struct in6_addr saddr_buf; struct in6_addr *addrp; struct net_device *dev; struct rt6_info *rt; u8 *opt; int rd_len; int err; int hlen; dev = skb->dev; rt = rt6_lookup(&skb->nh.ipv6h->saddr, NULL, dev->ifindex, 1); if (rt == NULL) return; if (rt->rt6i_flags & RTF_GATEWAY) { ND_PRINTK1("ndisc_send_redirect: not a neighbour\n"); dst_release(&rt->u.dst); return; } if (!xrlim_allow(&rt->u.dst, 1*HZ)) { dst_release(&rt->u.dst); return; } dst_release(&rt->u.dst); if (dev->addr_len) { if (neigh->nud_state&NUD_VALID) { len += NDISC_OPT_SPACE(dev->addr_len); } else { /* If nexthop is not valid, do not redirect! We will make it later, when will be sure, that it is alive. */ return; } } rd_len = min_t(unsigned int, IPV6_MIN_MTU-sizeof(struct ipv6hdr)-len, skb->len + 8); rd_len &= ~0x7; len += rd_len; if (ipv6_get_lladdr(dev, &saddr_buf)) { ND_PRINTK1("redirect: no link_local addr for dev\n"); return; } buff = sock_alloc_send_skb(sk, MAX_HEADER + len + dev->hard_header_len + 15, 0, &err); if (buff == NULL) { ND_PRINTK1("ndisc_send_redirect: alloc_skb failed\n"); return; } hlen = 0; if (ndisc_build_ll_hdr(buff, dev, &skb->nh.ipv6h->saddr, NULL, len) == 0) { kfree_skb(buff); return; } ip6_nd_hdr(sk, buff, dev, &saddr_buf, &skb->nh.ipv6h->saddr, IPPROTO_ICMPV6, len); icmph = (struct icmp6hdr *) skb_put(buff, len); memset(icmph, 0, sizeof(struct icmp6hdr)); icmph->icmp6_type = NDISC_REDIRECT; /* * copy target and destination addresses */ addrp = (struct in6_addr *)(icmph + 1); ipv6_addr_copy(addrp, target); addrp++; ipv6_addr_copy(addrp, &skb->nh.ipv6h->daddr); opt = (u8*) (addrp + 1); /* * include target_address option */ if (dev->addr_len) opt = ndisc_fill_option(opt, ND_OPT_TARGET_LL_ADDR, neigh->ha, dev->addr_len); /* * build redirect option and copy skb over to the new packet. */ memset(opt, 0, 8); *(opt++) = ND_OPT_REDIRECT_HDR; *(opt++) = (rd_len >> 3); opt += 6; memcpy(opt, skb->nh.ipv6h, rd_len - 8); icmph->icmp6_cksum = csum_ipv6_magic(&saddr_buf, &skb->nh.ipv6h->saddr, len, IPPROTO_ICMPV6, csum_partial((u8 *) icmph, len, 0)); dev_queue_xmit(buff); ICMP6_INC_STATS(Icmp6OutRedirects); ICMP6_INC_STATS(Icmp6OutMsgs);}static __inline__ struct neighbour *ndisc_recv_ns(struct in6_addr *saddr, struct sk_buff *skb){ u8 *opt; opt = skb->h.raw; opt += sizeof(struct icmp6hdr) + sizeof(struct in6_addr); opt = ndisc_find_option(opt, skb->dev->addr_len+2, skb->tail - opt, ND_OPT_SOURCE_LL_ADDR); return neigh_event_ns(&nd_tbl, opt, saddr, skb->dev);}static __inline__ int ndisc_recv_na(struct neighbour *neigh, struct sk_buff *skb){ struct nd_msg *msg = (struct nd_msg *) skb->h.raw; u8 *opt; opt = skb->h.raw; opt += sizeof(struct icmp6hdr) + sizeof(struct in6_addr); opt = ndisc_find_option(opt, skb->dev->addr_len+2, skb->tail - opt, ND_OPT_TARGET_LL_ADDR); return neigh_update(neigh, opt, msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE, msg->icmph.icmp6_override, 1);}static void pndisc_redo(struct sk_buff *skb){ ndisc_rcv(skb); kfree_skb(skb);}int ndisc_rcv(struct sk_buff *skb){ struct net_device *dev = skb->dev; struct in6_addr *saddr = &skb->nh.ipv6h->saddr; struct in6_addr *daddr = &skb->nh.ipv6h->daddr; struct nd_msg *msg = (struct nd_msg *) skb->h.raw; struct neighbour *neigh; struct inet6_ifaddr *ifp; unsigned int payload_len; __skb_push(skb, skb->data-skb->h.raw); if (skb->nh.ipv6h->hop_limit != 255) { if (net_ratelimit()) printk(KERN_WARNING "ICMP NDISC: fake message with non-255 Hop Limit received: %d\n", skb->nh.ipv6h->hop_limit); return 0; } if (msg->icmph.icmp6_code != 0) { if (net_ratelimit()) printk(KERN_WARNING "ICMP NDISC: code is not zero\n"); return 0; } /* XXX: RFC2461 Validation of [all ndisc messages]: * All included ndisc options MUST be of non-zero length * (Some checking in ndisc_find_option) */ payload_len = ntohs(skb->nh.ipv6h->payload_len); switch (msg->icmph.icmp6_type) { case NDISC_NEIGHBOUR_SOLICITATION: /* XXX: import nd_neighbor_solicit from glibc netinet/icmp6.h */ if (payload_len < 8+16) { if (net_ratelimit()) printk(KERN_WARNING "ICMP NS: packet too short\n"); return 0; } if (ipv6_addr_type(&msg->target)&IPV6_ADDR_MULTICAST) { if (net_ratelimit()) printk(KERN_WARNING "ICMP NS: target address is multicast\n"); return 0; } /* XXX: RFC2461 7.1.1: * If the IP source address is the unspecified address, there * MUST NOT be source link-layer address option in the message. * * NOTE! Linux kernel < 2.4.4 broke this rule. */ /* XXX: RFC2461 7.1.1: * If the IP source address is the unspecified address, the IP * destination address MUST be a solicited-node multicast address. */ if ((ifp = ipv6_get_ifaddr(&msg->target, dev)) != NULL) { int addr_type = ipv6_addr_type(saddr); if (ifp->flags & IFA_F_TENTATIVE) { /* Address is tentative. If the source is unspecified address, it is someone does DAD, otherwise we ignore solicitations until DAD timer expires. */ if (addr_type == IPV6_ADDR_ANY) { if (dev->type == ARPHRD_IEEE802_TR) { unsigned char *sadr = skb->mac.raw ; if (((sadr[8] &0x7f) != (dev->dev_addr[0] & 0x7f)) || (sadr[9] != dev->dev_addr[1]) || (sadr[10] != dev->dev_addr[2]) || (sadr[11] != dev->dev_addr[3]) || (sadr[12] != dev->dev_addr[4]) || (sadr[13] != dev->dev_addr[5])) { addrconf_dad_failure(ifp) ; } } else { addrconf_dad_failure(ifp); } } else in6_ifa_put(ifp); return 0; } if (addr_type == IPV6_ADDR_ANY) { struct in6_addr maddr; ipv6_addr_all_nodes(&maddr); ndisc_send_na(dev, NULL, &maddr, &ifp->addr, ifp->idev->cnf.forwarding, 0, ipv6_addr_type(&ifp->addr)&IPV6_ADDR_ANYCAST ? 0 : 1, 1); in6_ifa_put(ifp); return 0; } if (addr_type & IPV6_ADDR_UNICAST) { int inc = ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST; if (inc) nd_tbl.stats.rcv_probes_mcast++; else nd_tbl.stats.rcv_probes_ucast++; /* * update / create cache entry * for the source adddress */ neigh = ndisc_recv_ns(saddr, skb); if (neigh) { ndisc_send_na(dev, neigh, saddr, &ifp->addr, ifp->idev->cnf.forwarding, 1, ipv6_addr_type(&ifp->addr)&IPV6_ADDR_ANYCAST ? 0 : 1, 1); neigh_release(neigh); } } in6_ifa_put(ifp); } else { struct inet6_dev *in6_dev = in6_dev_get(dev); int addr_type = ipv6_addr_type(saddr); if (in6_dev && in6_dev->cnf.forwarding && (addr_type & IPV6_ADDR_UNICAST) && pneigh_lookup(&nd_tbl, &msg->target, dev, 0)) { int inc = ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST; if (skb->stamp.tv_sec == 0 || skb->pkt_type == PACKET_HOST || inc == 0 || in6_dev->nd_parms->proxy_delay == 0) { if (inc) nd_tbl.stats.rcv_probes_mcast++; else nd_tbl.stats.rcv_probes_ucast++; neigh = ndisc_recv_ns(saddr, skb); if (neigh) { ndisc_send_na(dev, neigh, saddr, &msg->target, 0, 1, 0, 1); neigh_release(neigh); } } else { struct sk_buff *n = skb_clone(skb, GFP_ATOMIC); if (n) pneigh_enqueue(&nd_tbl, in6_dev->nd_parms, n); in6_dev_put(in6_dev); return 0; } } if (in6_dev) in6_dev_put(in6_dev); } return 0; case NDISC_NEIGHBOUR_ADVERTISEMENT: /* XXX: import nd_neighbor_advert from glibc netinet/icmp6.h */ if (payload_len < 16+8 ) { if (net_ratelimit()) printk(KERN_WARNING "ICMP NA: packet too short\n"); return 0; } if (ipv6_addr_type(&msg->target)&IPV6_ADDR_MULTICAST) { if (net_ratelimit()) printk(KERN_WARNING "NDISC NA: target address is multicast\n"); return 0; } if ((ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST) && msg->icmph.icmp6_solicited) { ND_PRINTK0("NDISC: solicited NA is multicasted\n"); return 0; } if ((ifp = ipv6_get_ifaddr(&msg->target, dev))) { if (ifp->flags & IFA_F_TENTATIVE) { addrconf_dad_failure(ifp); return 0; } /* What should we make now? The advertisement is invalid, but ndisc specs say nothing about it. It could be misconfiguration, or an smart proxy agent tries to help us :-) */ ND_PRINTK0("%s: someone advertises our address!\n", ifp->idev->dev->name); in6_ifa_put(ifp); return 0; } neigh = neigh_lookup(&nd_tbl, &msg->target, skb->dev); if (neigh) { if (neigh->flags & NTF_ROUTER) { if (msg->icmph.icmp6_router == 0) { /* * Change: router to host */ struct rt6_info *rt; rt = rt6_get_dflt_router(saddr, skb->dev); if (rt) { /* It is safe only because we aer in BH */ dst_release(&rt->u.dst); ip6_del_rt(rt); } } } else { if (msg->icmph.icmp6_router) neigh->flags |= NTF_ROUTER; } ndisc_recv_na(neigh, skb); neigh_release(neigh); } break; case NDISC_ROUTER_ADVERTISEMENT: /* XXX: import nd_router_advert from glibc netinet/icmp6.h */ if (payload_len < 8+4+4) { if (net_ratelimit()) printk(KERN_WARNING "ICMP RA: packet too short\n"); return 0; } ndisc_router_discovery(skb); break; case NDISC_REDIRECT: /* XXX: import nd_redirect from glibc netinet/icmp6.h */ if (payload_len < 8+16+16) { if (net_ratelimit()) printk(KERN_WARNING "ICMP redirect: packet too short\n"); return 0; } ndisc_redirect_rcv(skb); break; case NDISC_ROUTER_SOLICITATION: /* No RS support in the kernel, but we do some required checks */ /* XXX: import nd_router_solicit from glibc netinet/icmp6.h */ if (payload_len < 8) { if (net_ratelimit()) printk(KERN_WARNING "ICMP RS: packet too short\n"); return 0; } break; }; return 0;}int __init ndisc_init(struct net_proto_family *ops){ struct sock *sk; int err; ndisc_socket = sock_alloc(); if (ndisc_socket == NULL) { printk(KERN_ERR "Failed to create the NDISC control socket.\n"); return -1; } ndisc_socket->inode->i_uid = 0; ndisc_socket->inode->i_gid = 0; ndisc_socket->type = SOCK_RAW; if((err = ops->create(ndisc_socket, IPPROTO_ICMPV6)) < 0) { printk(KERN_DEBUG "Failed to initialize the NDISC control socket (err %d).\n", err); sock_release(ndisc_socket); ndisc_socket = NULL; /* For safety. */ return err; } sk = ndisc_socket->sk; sk->allocation = GFP_ATOMIC; sk->net_pinfo.af_inet6.hop_limit = 255; /* Do not loopback ndisc messages */ sk->net_pinfo.af_inet6.mc_loop = 0; sk->prot->unhash(sk); /* * Initialize the neighbour table */ neigh_table_init(&nd_tbl);#ifdef CONFIG_SYSCTL neigh_sysctl_register(NULL, &nd_tbl.parms, NET_IPV6, NET_IPV6_NEIGH, "ipv6");#endif return 0;}void ndisc_cleanup(void){ neigh_table_clear(&nd_tbl); sock_release(ndisc_socket); ndisc_socket = NULL; /* For safety. */}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -