⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ndisc.c

📁 嵌入式系统设计与实验教材二源码linux内核移植与编译
💻 C
📖 第 1 页 / 共 2 页
字号:
	if (ra_msg->icmph.icmp6_hop_limit)		in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;	/*	 *	Update Reachable Time and Retrans Timer	 */	if (in6_dev->nd_parms) {		__u32 rtime = ntohl(ra_msg->retrans_timer);		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {			rtime = (rtime*HZ)/1000;			if (rtime < HZ/10)				rtime = HZ/10;			in6_dev->nd_parms->retrans_time = rtime;		}		rtime = ntohl(ra_msg->reachable_time);		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {			rtime = (rtime*HZ)/1000;			if (rtime < HZ/10)				rtime = HZ/10;			if (rtime != in6_dev->nd_parms->base_reachable_time) {				in6_dev->nd_parms->base_reachable_time = rtime;				in6_dev->nd_parms->gc_staletime = 3 * rtime;				in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);			}		}	}	/*	 *	Process options.	 */        while (optlen > 0) {                int len = (opt[1] << 3);		if (len == 0) {			ND_PRINTK0("RA: opt has 0 len\n");			break;		}                switch(*opt) {                case ND_OPT_SOURCE_LL_ADDR:			if (rt == NULL)				break;						if ((neigh = rt->rt6i_nexthop) != NULL &&			    skb->dev->addr_len + 2 >= len)				neigh_update(neigh, opt+2, NUD_STALE, 1, 1);			break;                case ND_OPT_PREFIX_INFO:			addrconf_prefix_rcv(skb->dev, opt, len);                        break;                case ND_OPT_MTU:			{				int mtu;								mtu = htonl(*(__u32 *)(opt+4));				if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {					ND_PRINTK0("NDISC: router "						   "announcement with mtu = %d\n",						   mtu);					break;				}				if (in6_dev->cnf.mtu6 != mtu) {					in6_dev->cnf.mtu6 = mtu;					if (rt)						rt->u.dst.pmtu = mtu;					rt6_mtu_change(skb->dev, mtu);				}			}                        break;		case ND_OPT_TARGET_LL_ADDR:		case ND_OPT_REDIRECT_HDR:			ND_PRINTK0("got illegal option with RA");			break;		default:			ND_PRINTK0("unkown option in RA\n");                };                optlen -= len;                opt += len;        }	if (rt)		dst_release(&rt->u.dst);	in6_dev_put(in6_dev);}static void ndisc_redirect_rcv(struct sk_buff *skb){	struct inet6_dev *in6_dev;	struct icmp6hdr *icmph;	struct in6_addr *dest;	struct in6_addr *target;	/* new first hop to destination */	struct neighbour *neigh;	int on_link = 0;	int optlen;	if (!(ipv6_addr_type(&skb->nh.ipv6h->saddr) & IPV6_ADDR_LINKLOCAL)) {		if (net_ratelimit())			printk(KERN_WARNING "ICMP redirect: source address is not linklocal\n");		return;	}	optlen = skb->tail - skb->h.raw;	optlen -= sizeof(struct icmp6hdr) + 2 * sizeof(struct in6_addr);	if (optlen < 0) {		if (net_ratelimit())			printk(KERN_WARNING "ICMP redirect: packet too small\n");		return;	}	icmph = (struct icmp6hdr *) skb->h.raw;	target = (struct in6_addr *) (icmph + 1);	dest = target + 1;	if (ipv6_addr_type(dest) & IPV6_ADDR_MULTICAST) {		if (net_ratelimit())			printk(KERN_WARNING "ICMP redirect for multicast addr\n");		return;	}	if (ipv6_addr_cmp(dest, target) == 0) {		on_link = 1;	} else if (!(ipv6_addr_type(target) & IPV6_ADDR_LINKLOCAL)) {		if (net_ratelimit())			printk(KERN_WARNING "ICMP redirect: target address is not linklocal\n");		return;	}	in6_dev = in6_dev_get(skb->dev);	if (!in6_dev)		return;	if (in6_dev->cnf.forwarding || !in6_dev->cnf.accept_redirects) {		in6_dev_put(in6_dev);		return;	}	/* XXX: RFC2461 8.1: 	 *	The IP source address of the Redirect MUST be the same as the current	 *	first-hop router for the specified ICMP Destination Address.	 */			/* passed validation tests */	/*	   We install redirect only if nexthop state is valid.	 */	neigh = __neigh_lookup(&nd_tbl, target, skb->dev, 1);	if (neigh) {		ndisc_update(neigh, (u8*)(dest + 1), optlen, ND_OPT_TARGET_LL_ADDR);		if (neigh->nud_state&NUD_VALID)			rt6_redirect(dest, &skb->nh.ipv6h->saddr, neigh, on_link);		else			__neigh_event_send(neigh, NULL);		neigh_release(neigh);	}	in6_dev_put(in6_dev);}void ndisc_send_redirect(struct sk_buff *skb, struct neighbour *neigh,			 struct in6_addr *target){	struct sock *sk = ndisc_socket->sk;	int len = sizeof(struct icmp6hdr) + 2 * sizeof(struct in6_addr);	struct sk_buff *buff;	struct icmp6hdr *icmph;	struct in6_addr saddr_buf;	struct in6_addr *addrp;	struct net_device *dev;	struct rt6_info *rt;	u8 *opt;	int rd_len;	int err;	int hlen;	dev = skb->dev;	rt = rt6_lookup(&skb->nh.ipv6h->saddr, NULL, dev->ifindex, 1);	if (rt == NULL)		return;	if (rt->rt6i_flags & RTF_GATEWAY) {		ND_PRINTK1("ndisc_send_redirect: not a neighbour\n");		dst_release(&rt->u.dst);		return;	}	if (!xrlim_allow(&rt->u.dst, 1*HZ)) {		dst_release(&rt->u.dst);		return;	}	dst_release(&rt->u.dst);	if (dev->addr_len) {		if (neigh->nud_state&NUD_VALID) {			len  += NDISC_OPT_SPACE(dev->addr_len);		} else {			/* If nexthop is not valid, do not redirect!			   We will make it later, when will be sure,			   that it is alive.			 */			return;		}	}	rd_len = min_t(unsigned int,		     IPV6_MIN_MTU-sizeof(struct ipv6hdr)-len, skb->len + 8);	rd_len &= ~0x7;	len += rd_len;	if (ipv6_get_lladdr(dev, &saddr_buf)) { 		ND_PRINTK1("redirect: no link_local addr for dev\n"); 		return; 	}	buff = sock_alloc_send_skb(sk, MAX_HEADER + len + dev->hard_header_len + 15,				   0, &err);	if (buff == NULL) {		ND_PRINTK1("ndisc_send_redirect: alloc_skb failed\n");		return;	}	hlen = 0;	if (ndisc_build_ll_hdr(buff, dev, &skb->nh.ipv6h->saddr, NULL, len) == 0) {		kfree_skb(buff);		return;	}	ip6_nd_hdr(sk, buff, dev, &saddr_buf, &skb->nh.ipv6h->saddr,		   IPPROTO_ICMPV6, len);	icmph = (struct icmp6hdr *) skb_put(buff, len);	memset(icmph, 0, sizeof(struct icmp6hdr));	icmph->icmp6_type = NDISC_REDIRECT;	/*	 *	copy target and destination addresses	 */	addrp = (struct in6_addr *)(icmph + 1);	ipv6_addr_copy(addrp, target);	addrp++;	ipv6_addr_copy(addrp, &skb->nh.ipv6h->daddr);	opt = (u8*) (addrp + 1);	/*	 *	include target_address option	 */	if (dev->addr_len)		opt = ndisc_fill_option(opt, ND_OPT_TARGET_LL_ADDR, neigh->ha, dev->addr_len);	/*	 *	build redirect option and copy skb over to the new packet.	 */	memset(opt, 0, 8);		*(opt++) = ND_OPT_REDIRECT_HDR;	*(opt++) = (rd_len >> 3);	opt += 6;	memcpy(opt, skb->nh.ipv6h, rd_len - 8);	icmph->icmp6_cksum = csum_ipv6_magic(&saddr_buf, &skb->nh.ipv6h->saddr,					     len, IPPROTO_ICMPV6,					     csum_partial((u8 *) icmph, len, 0));	dev_queue_xmit(buff);	ICMP6_INC_STATS(Icmp6OutRedirects);	ICMP6_INC_STATS(Icmp6OutMsgs);}static __inline__ struct neighbour *ndisc_recv_ns(struct in6_addr *saddr, struct sk_buff *skb){	u8 *opt;	opt = skb->h.raw;	opt += sizeof(struct icmp6hdr) + sizeof(struct in6_addr);	opt = ndisc_find_option(opt, skb->dev->addr_len+2, skb->tail - opt, ND_OPT_SOURCE_LL_ADDR);	return neigh_event_ns(&nd_tbl, opt, saddr, skb->dev);}static __inline__ int ndisc_recv_na(struct neighbour *neigh, struct sk_buff *skb){	struct nd_msg *msg = (struct nd_msg *) skb->h.raw;	u8 *opt;	opt = skb->h.raw;	opt += sizeof(struct icmp6hdr) + sizeof(struct in6_addr);	opt = ndisc_find_option(opt, skb->dev->addr_len+2, skb->tail - opt, ND_OPT_TARGET_LL_ADDR);	return neigh_update(neigh, opt,			    msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE,			    msg->icmph.icmp6_override, 1);}static void pndisc_redo(struct sk_buff *skb){	ndisc_rcv(skb);	kfree_skb(skb);}int ndisc_rcv(struct sk_buff *skb){	struct net_device *dev = skb->dev;	struct in6_addr *saddr = &skb->nh.ipv6h->saddr;	struct in6_addr *daddr = &skb->nh.ipv6h->daddr;	struct nd_msg *msg = (struct nd_msg *) skb->h.raw;	struct neighbour *neigh;	struct inet6_ifaddr *ifp;	unsigned int payload_len;	__skb_push(skb, skb->data-skb->h.raw);	if (skb->nh.ipv6h->hop_limit != 255) {		if (net_ratelimit())			printk(KERN_WARNING			       "ICMP NDISC: fake message with non-255 Hop Limit received: %d\n",			       		skb->nh.ipv6h->hop_limit);		return 0;	}	if (msg->icmph.icmp6_code != 0) {		if (net_ratelimit())			printk(KERN_WARNING "ICMP NDISC: code is not zero\n");		return 0;	}	/* XXX: RFC2461 Validation of [all ndisc messages]:	 *	All included ndisc options MUST be of non-zero length	 *	(Some checking in ndisc_find_option)	 */	payload_len = ntohs(skb->nh.ipv6h->payload_len);	switch (msg->icmph.icmp6_type) {	case NDISC_NEIGHBOUR_SOLICITATION:		/* XXX: import nd_neighbor_solicit from glibc netinet/icmp6.h */		if (payload_len < 8+16) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP NS: packet too short\n");			return 0;		}		if (ipv6_addr_type(&msg->target)&IPV6_ADDR_MULTICAST) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP NS: target address is multicast\n");			return 0;		}		/* XXX: RFC2461 7.1.1:		 * 	If the IP source address is the unspecified address, there		 *	MUST NOT be source link-layer address option in the message.		 *		 *	NOTE! Linux kernel < 2.4.4 broke this rule.		 */		 			/* XXX: RFC2461 7.1.1:		 *	If the IP source address is the unspecified address, the IP      		 *	destination address MUST be a solicited-node multicast address.		 */		if ((ifp = ipv6_get_ifaddr(&msg->target, dev)) != NULL) {			int addr_type = ipv6_addr_type(saddr);			if (ifp->flags & IFA_F_TENTATIVE) {				/* Address is tentative. If the source				   is unspecified address, it is someone				   does DAD, otherwise we ignore solicitations				   until DAD timer expires.				 */				if (addr_type == IPV6_ADDR_ANY) {					if (dev->type == ARPHRD_IEEE802_TR) { 						unsigned char *sadr = skb->mac.raw ;						if (((sadr[8] &0x7f) != (dev->dev_addr[0] & 0x7f)) ||						(sadr[9] != dev->dev_addr[1]) ||						(sadr[10] != dev->dev_addr[2]) ||						(sadr[11] != dev->dev_addr[3]) ||						(sadr[12] != dev->dev_addr[4]) ||						(sadr[13] != dev->dev_addr[5])) 						{							addrconf_dad_failure(ifp) ; 						}					} else {						addrconf_dad_failure(ifp);					}				} else					in6_ifa_put(ifp);				return 0;			}			if (addr_type == IPV6_ADDR_ANY) {				struct in6_addr maddr;				ipv6_addr_all_nodes(&maddr);				ndisc_send_na(dev, NULL, &maddr, &ifp->addr, 					      ifp->idev->cnf.forwarding, 0, 					      ipv6_addr_type(&ifp->addr)&IPV6_ADDR_ANYCAST ? 0 : 1, 					      1);				in6_ifa_put(ifp);				return 0;			}			if (addr_type & IPV6_ADDR_UNICAST) {				int inc = ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST;				if (inc)					nd_tbl.stats.rcv_probes_mcast++;				else					nd_tbl.stats.rcv_probes_ucast++;				/* 				 *	update / create cache entry				 *	for the source adddress				 */				neigh = ndisc_recv_ns(saddr, skb);				if (neigh) {					ndisc_send_na(dev, neigh, saddr, &ifp->addr, 						      ifp->idev->cnf.forwarding, 1, 						      ipv6_addr_type(&ifp->addr)&IPV6_ADDR_ANYCAST ? 0 : 1, 						      1);					neigh_release(neigh);				}			}			in6_ifa_put(ifp);		} else {			struct inet6_dev *in6_dev = in6_dev_get(dev);			int addr_type = ipv6_addr_type(saddr);			if (in6_dev && in6_dev->cnf.forwarding &&			    (addr_type & IPV6_ADDR_UNICAST) &&			    pneigh_lookup(&nd_tbl, &msg->target, dev, 0)) {				int inc = ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST;				if (skb->stamp.tv_sec == 0 ||				    skb->pkt_type == PACKET_HOST ||				    inc == 0 ||				    in6_dev->nd_parms->proxy_delay == 0) {					if (inc)						nd_tbl.stats.rcv_probes_mcast++;					else						nd_tbl.stats.rcv_probes_ucast++;					neigh = ndisc_recv_ns(saddr, skb);					if (neigh) {						ndisc_send_na(dev, neigh, saddr, &msg->target,							      0, 1, 0, 1);						neigh_release(neigh);					}				} else {					struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);					if (n)						pneigh_enqueue(&nd_tbl, in6_dev->nd_parms, n);					in6_dev_put(in6_dev);					return 0;				}			}			if (in6_dev)				in6_dev_put(in6_dev);					}		return 0;	case NDISC_NEIGHBOUR_ADVERTISEMENT:		/* XXX: import nd_neighbor_advert from glibc netinet/icmp6.h */		if (payload_len < 16+8 ) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP NA: packet too short\n");			return 0;		}		if (ipv6_addr_type(&msg->target)&IPV6_ADDR_MULTICAST) {			if (net_ratelimit())				printk(KERN_WARNING "NDISC NA: target address is multicast\n");			return 0;		}		if ((ipv6_addr_type(daddr)&IPV6_ADDR_MULTICAST) &&		    msg->icmph.icmp6_solicited) {			ND_PRINTK0("NDISC: solicited NA is multicasted\n");			return 0;		}				if ((ifp = ipv6_get_ifaddr(&msg->target, dev))) {			if (ifp->flags & IFA_F_TENTATIVE) {				addrconf_dad_failure(ifp);				return 0;			}			/* What should we make now? The advertisement			   is invalid, but ndisc specs say nothing			   about it. It could be misconfiguration, or			   an smart proxy agent tries to help us :-)			 */			ND_PRINTK0("%s: someone advertises our address!\n",				   ifp->idev->dev->name);			in6_ifa_put(ifp);			return 0;		}		neigh = neigh_lookup(&nd_tbl, &msg->target, skb->dev);		if (neigh) {			if (neigh->flags & NTF_ROUTER) {				if (msg->icmph.icmp6_router == 0) {					/*					 *	Change: router to host					 */					struct rt6_info *rt;					rt = rt6_get_dflt_router(saddr, skb->dev);					if (rt) {						/* It is safe only because						   we aer in BH */						dst_release(&rt->u.dst);						ip6_del_rt(rt);					}				}			} else {				if (msg->icmph.icmp6_router)					neigh->flags |= NTF_ROUTER;			}			ndisc_recv_na(neigh, skb);			neigh_release(neigh);		}		break;	case NDISC_ROUTER_ADVERTISEMENT:		/* XXX: import nd_router_advert from glibc netinet/icmp6.h */		if (payload_len < 8+4+4) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP RA: packet too short\n");			return 0;		}		ndisc_router_discovery(skb);		break;	case NDISC_REDIRECT:		/* XXX: import nd_redirect from glibc netinet/icmp6.h */		if (payload_len < 8+16+16) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP redirect: packet too short\n");			return 0;		}		ndisc_redirect_rcv(skb);		break;	case NDISC_ROUTER_SOLICITATION:		/* No RS support in the kernel, but we do some required checks */		/* XXX: import nd_router_solicit from glibc netinet/icmp6.h */		if (payload_len < 8) {			if (net_ratelimit())				printk(KERN_WARNING "ICMP RS: packet too short\n");			return 0;		}		break;	};	return 0;}int __init ndisc_init(struct net_proto_family *ops){	struct sock *sk;        int err;	ndisc_socket = sock_alloc();	if (ndisc_socket == NULL) {		printk(KERN_ERR		       "Failed to create the NDISC control socket.\n");		return -1;	}	ndisc_socket->inode->i_uid = 0;	ndisc_socket->inode->i_gid = 0;	ndisc_socket->type = SOCK_RAW;	if((err = ops->create(ndisc_socket, IPPROTO_ICMPV6)) < 0) {		printk(KERN_DEBUG 		       "Failed to initialize the NDISC control socket (err %d).\n",		       err);		sock_release(ndisc_socket);		ndisc_socket = NULL; /* For safety. */		return err;	}	sk = ndisc_socket->sk;	sk->allocation = GFP_ATOMIC;	sk->net_pinfo.af_inet6.hop_limit = 255;	/* Do not loopback ndisc messages */	sk->net_pinfo.af_inet6.mc_loop = 0;	sk->prot->unhash(sk);        /*         * Initialize the neighbour table         */		neigh_table_init(&nd_tbl);#ifdef CONFIG_SYSCTL	neigh_sysctl_register(NULL, &nd_tbl.parms, NET_IPV6, NET_IPV6_NEIGH, "ipv6");#endif	return 0;}void ndisc_cleanup(void){	neigh_table_clear(&nd_tbl);	sock_release(ndisc_socket);	ndisc_socket = NULL; /* For safety. */}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -