/** * @file * * IPv6 layer. */ /* * Copyright (c) 2010 Inico Technologies Ltd. * All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY * OF SUCH DAMAGE. * * This file is part of the lwIP TCP/IP stack. * * Author: Ivan Delamer * * * Please coordinate changes and requests with Ivan Delamer * */ #include "lwip/opt.h" #if LWIP_IPV6 /* don't build if not configured for use in lwipopts.h */ #include "lwip/def.h" #include "lwip/mem.h" #include "lwip/netif.h" #include "lwip/ip.h" #include "lwip/ip6.h" #include "lwip/ip6_addr.h" #include "lwip/ip6_frag.h" #include "lwip/icmp6.h" #include "lwip/priv/raw_priv.h" #include "lwip/udp.h" #include "lwip/priv/tcp_priv.h" #include "lwip/dhcp6.h" #include "lwip/nd6.h" #include "lwip/mld6.h" #include "lwip/debug.h" #include "lwip/stats.h" #ifdef LWIP_HOOK_FILENAME #include LWIP_HOOK_FILENAME #endif /** * Finds the appropriate network interface for a given IPv6 address. It tries to select * a netif following a sequence of heuristics: * 1) if there is only 1 netif, return it * 2) if the destination is a zoned address, match its zone to a netif * 3) if the either the source or destination address is a scoped address, * match the source address's zone (if set) or address (if not) to a netif * 4) tries to match the destination subnet to a configured address * 5) tries to find a router-announced route * 6) tries to match the (unscoped) source address to the netif * 7) returns the default netif, if configured * * Note that each of the two given addresses may or may not be properly zoned. * * @param src the source IPv6 address, if known * @param dest the destination IPv6 address for which to find the route * @return the netif on which to send to reach dest */ struct netif * ip6_route(const ip6_addr_t *src, const ip6_addr_t *dest) { #if LWIP_SINGLE_NETIF LWIP_UNUSED_ARG(src); LWIP_UNUSED_ARG(dest); #else /* LWIP_SINGLE_NETIF */ struct netif *netif; s8_t i; LWIP_ASSERT_CORE_LOCKED(); /* If single netif configuration, fast return. */ if ((netif_list != NULL) && (netif_list->next == NULL)) { if (!netif_is_up(netif_list) || !netif_is_link_up(netif_list) || (ip6_addr_has_zone(dest) && !ip6_addr_test_zone(dest, netif_list))) { return NULL; } return netif_list; } #if LWIP_IPV6_SCOPES /* Special processing for zoned destination addresses. This includes link- * local unicast addresses and interface/link-local multicast addresses. Use * the zone to find a matching netif. If the address is not zoned, then there * is technically no "wrong" netif to choose, and we leave routing to other * rules; in most cases this should be the scoped-source rule below. */ if (ip6_addr_has_zone(dest)) { IP6_ADDR_ZONECHECK(dest); /* Find a netif based on the zone. For custom mappings, one zone may map * to multiple netifs, so find one that can actually send a packet. */ NETIF_FOREACH(netif) { if (ip6_addr_test_zone(dest, netif) && netif_is_up(netif) && netif_is_link_up(netif)) { return netif; } } /* No matching netif found. Do no try to route to a different netif, * as that would be a zone violation, resulting in any packets sent to * that netif being dropped on output. */ return NULL; } #endif /* LWIP_IPV6_SCOPES */ /* Special processing for scoped source and destination addresses. If we get * here, the destination address does not have a zone, so either way we need * to look at the source address, which may or may not have a zone. If it * does, the zone is restrictive: there is (typically) only one matching * netif for it, and we should avoid routing to any other netif as that would * result in guaranteed zone violations. For scoped source addresses that do * not have a zone, use (only) a netif that has that source address locally * assigned. This case also applies to the loopback source address, which has * an implied link-local scope. If only the destination address is scoped * (but, again, not zoned), we still want to use only the source address to * determine its zone because that's most likely what the user/application * wants, regardless of whether the source address is scoped. Finally, some * of this story also applies if scoping is disabled altogether. */ #if LWIP_IPV6_SCOPES if (ip6_addr_has_scope(dest, IP6_UNKNOWN) || ip6_addr_has_scope(src, IP6_UNICAST) || #else /* LWIP_IPV6_SCOPES */ if (ip6_addr_islinklocal(dest) || ip6_addr_ismulticast_iflocal(dest) || ip6_addr_ismulticast_linklocal(dest) || ip6_addr_islinklocal(src) || #endif /* LWIP_IPV6_SCOPES */ ip6_addr_isloopback(src)) { #if LWIP_IPV6_SCOPES if (ip6_addr_has_zone(src)) { /* Find a netif matching the source zone (relatively cheap). */ NETIF_FOREACH(netif) { if (netif_is_up(netif) && netif_is_link_up(netif) && ip6_addr_test_zone(src, netif)) { return netif; } } } else #endif /* LWIP_IPV6_SCOPES */ { /* Find a netif matching the source address (relatively expensive). */ NETIF_FOREACH(netif) { if (!netif_is_up(netif) || !netif_is_link_up(netif)) { continue; } for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i)) && ip6_addr_zoneless_eq(src, netif_ip6_addr(netif, i))) { return netif; } } } } /* Again, do not use any other netif in this case, as that could result in * zone boundary violations. */ return NULL; } /* We come here only if neither source nor destination is scoped. */ IP6_ADDR_ZONECHECK(src); #ifdef LWIP_HOOK_IP6_ROUTE netif = LWIP_HOOK_IP6_ROUTE(src, dest); if (netif != NULL) { return netif; } #endif /* See if the destination subnet matches a configured address. In accordance * with RFC 5942, dynamically configured addresses do not have an implied * local subnet, and thus should be considered /128 assignments. However, as * such, the destination address may still match a local address, and so we * still need to check for exact matches here. By (lwIP) policy, statically * configured addresses do always have an implied local /64 subnet. */ NETIF_FOREACH(netif) { if (!netif_is_up(netif) || !netif_is_link_up(netif)) { continue; } for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i)) && ip6_addr_net_eq(dest, netif_ip6_addr(netif, i)) && (netif_ip6_addr_isstatic(netif, i) || ip6_addr_nethost_eq(dest, netif_ip6_addr(netif, i)))) { return netif; } } } /* Get the netif for a suitable router-announced route. */ netif = nd6_find_route(dest); if (netif != NULL) { return netif; } /* Try with the netif that matches the source address. Given the earlier rule * for scoped source addresses, this applies to unscoped addresses only. */ if (!ip6_addr_isany(src)) { NETIF_FOREACH(netif) { if (!netif_is_up(netif) || !netif_is_link_up(netif)) { continue; } for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i)) && ip6_addr_eq(src, netif_ip6_addr(netif, i))) { return netif; } } } } #if LWIP_NETIF_LOOPBACK && !LWIP_HAVE_LOOPIF /* loopif is disabled, loopback traffic is passed through any netif */ if (ip6_addr_isloopback(dest)) { /* don't check for link on loopback traffic */ if (netif_default != NULL && netif_is_up(netif_default)) { return netif_default; } /* default netif is not up, just use any netif for loopback traffic */ NETIF_FOREACH(netif) { if (netif_is_up(netif)) { return netif; } } return NULL; } #endif /* LWIP_NETIF_LOOPBACK && !LWIP_HAVE_LOOPIF */ #endif /* !LWIP_SINGLE_NETIF */ /* no matching netif found, use default netif, if up */ if ((netif_default == NULL) || !netif_is_up(netif_default) || !netif_is_link_up(netif_default)) { return NULL; } return netif_default; } /** * @ingroup ip6 * Select the best IPv6 source address for a given destination IPv6 address. * * This implementation follows RFC 6724 Sec. 5 to the following extent: * - Rules 1, 2, 3: fully implemented * - Rules 4, 5, 5.5: not applicable * - Rule 6: not implemented * - Rule 7: not applicable * - Rule 8: limited to "prefer /64 subnet match over non-match" * * For Rule 2, we deliberately deviate from RFC 6724 Sec. 3.1 by considering * ULAs to be of smaller scope than global addresses, to avoid that a preferred * ULA is picked over a deprecated global address when given a global address * as destination, as that would likely result in broken two-way communication. * * As long as temporary addresses are not supported (as used in Rule 7), a * proper implementation of Rule 8 would obviate the need to implement Rule 6. * * @param netif the netif on which to send a packet * @param dest the destination we are trying to reach (possibly not properly * zoned) * @return the most suitable source address to use, or NULL if no suitable * source address is found */ const ip_addr_t * ip6_select_source_address(struct netif *netif, const ip6_addr_t *dest) { const ip_addr_t *best_addr; const ip6_addr_t *cand_addr; s8_t dest_scope, cand_scope; s8_t best_scope = IP6_MULTICAST_SCOPE_RESERVED; u8_t i, cand_pref, cand_bits; u8_t best_pref = 0; u8_t best_bits = 0; /* Start by determining the scope of the given destination address. These * tests are hopefully (roughly) in order of likeliness to match. */ if (ip6_addr_isglobal(dest)) { dest_scope = IP6_MULTICAST_SCOPE_GLOBAL; } else if (ip6_addr_islinklocal(dest) || ip6_addr_isloopback(dest)) { dest_scope = IP6_MULTICAST_SCOPE_LINK_LOCAL; } else if (ip6_addr_isuniquelocal(dest)) { dest_scope = IP6_MULTICAST_SCOPE_ORGANIZATION_LOCAL; } else if (ip6_addr_ismulticast(dest)) { dest_scope = ip6_addr_multicast_scope(dest); } else if (ip6_addr_issitelocal(dest)) { dest_scope = IP6_MULTICAST_SCOPE_SITE_LOCAL; } else { /* no match, consider scope global */ dest_scope = IP6_MULTICAST_SCOPE_GLOBAL; } best_addr = NULL; for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { /* Consider only valid (= preferred and deprecated) addresses. */ if (!ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) { continue; } /* Determine the scope of this candidate address. Same ordering idea. */ cand_addr = netif_ip6_addr(netif, i); if (ip6_addr_isglobal(cand_addr)) { cand_scope = IP6_MULTICAST_SCOPE_GLOBAL; } else if (ip6_addr_islinklocal(cand_addr)) { cand_scope = IP6_MULTICAST_SCOPE_LINK_LOCAL; } else if (ip6_addr_isuniquelocal(cand_addr)) { cand_scope = IP6_MULTICAST_SCOPE_ORGANIZATION_LOCAL; } else if (ip6_addr_issitelocal(cand_addr)) { cand_scope = IP6_MULTICAST_SCOPE_SITE_LOCAL; } else { /* no match, treat as low-priority global scope */ cand_scope = IP6_MULTICAST_SCOPE_RESERVEDF; } cand_pref = ip6_addr_ispreferred(netif_ip6_addr_state(netif, i)); /* @todo compute the actual common bits, for longest matching prefix. */ /* We cannot count on the destination address having a proper zone * assignment, so do not compare zones in this case. */ cand_bits = ip6_addr_net_zoneless_eq(cand_addr, dest); /* just 1 or 0 for now */ if (cand_bits && ip6_addr_nethost_eq(cand_addr, dest)) { return netif_ip_addr6(netif, i); /* Rule 1 */ } if ((best_addr == NULL) || /* no alternative yet */ ((cand_scope < best_scope) && (cand_scope >= dest_scope)) || ((cand_scope > best_scope) && (best_scope < dest_scope)) || /* Rule 2 */ ((cand_scope == best_scope) && ((cand_pref > best_pref) || /* Rule 3 */ ((cand_pref == best_pref) && (cand_bits > best_bits))))) { /* Rule 8 */ /* We found a new "winning" candidate. */ best_addr = netif_ip_addr6(netif, i); best_scope = cand_scope; best_pref = cand_pref; best_bits = cand_bits; } } return best_addr; /* may be NULL */ } #if LWIP_IPV6_FORWARD /** * Forwards an IPv6 packet. It finds an appropriate route for the * packet, decrements the HL value of the packet, and outputs * the packet on the appropriate interface. * * @param p the packet to forward (p->payload points to IP header) * @param iphdr the IPv6 header of the input packet * @param inp the netif on which this packet was received */ static void ip6_forward(struct pbuf *p, struct ip6_hdr *iphdr, struct netif *inp) { struct netif *netif; /* do not forward link-local or loopback addresses */ if (ip6_addr_islinklocal(ip6_current_dest_addr()) || ip6_addr_isloopback(ip6_current_dest_addr())) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_forward: not forwarding link-local address.\n")); IP6_STATS_INC(ip6.rterr); IP6_STATS_INC(ip6.drop); return; } /* Find network interface where to forward this IP packet to. */ netif = ip6_route(IP6_ADDR_ANY6, ip6_current_dest_addr()); if (netif == NULL) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_forward: no route for %"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F"\n", IP6_ADDR_BLOCK1(ip6_current_dest_addr()), IP6_ADDR_BLOCK2(ip6_current_dest_addr()), IP6_ADDR_BLOCK3(ip6_current_dest_addr()), IP6_ADDR_BLOCK4(ip6_current_dest_addr()), IP6_ADDR_BLOCK5(ip6_current_dest_addr()), IP6_ADDR_BLOCK6(ip6_current_dest_addr()), IP6_ADDR_BLOCK7(ip6_current_dest_addr()), IP6_ADDR_BLOCK8(ip6_current_dest_addr()))); #if LWIP_ICMP6 /* Don't send ICMP messages in response to ICMP messages */ if (IP6H_NEXTH(iphdr) != IP6_NEXTH_ICMP6) { icmp6_dest_unreach(p, ICMP6_DUR_NO_ROUTE); } #endif /* LWIP_ICMP6 */ IP6_STATS_INC(ip6.rterr); IP6_STATS_INC(ip6.drop); return; } #if LWIP_IPV6_SCOPES /* Do not forward packets with a zoned (e.g., link-local) source address * outside of their zone. We determined the zone a bit earlier, so we know * that the address is properly zoned here, so we can safely use has_zone. * Also skip packets with a loopback source address (link-local implied). */ if ((ip6_addr_has_zone(ip6_current_src_addr()) && !ip6_addr_test_zone(ip6_current_src_addr(), netif)) || ip6_addr_isloopback(ip6_current_src_addr())) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_forward: not forwarding packet beyond its source address zone.\n")); IP6_STATS_INC(ip6.rterr); IP6_STATS_INC(ip6.drop); return; } #endif /* LWIP_IPV6_SCOPES */ /* Do not forward packets onto the same network interface on which * they arrived. */ if (netif == inp) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_forward: not bouncing packets back on incoming interface.\n")); IP6_STATS_INC(ip6.rterr); IP6_STATS_INC(ip6.drop); return; } /* decrement HL */ IP6H_HOPLIM_SET(iphdr, IP6H_HOPLIM(iphdr) - 1); /* send ICMP6 if HL == 0 */ if (IP6H_HOPLIM(iphdr) == 0) { #if LWIP_ICMP6 /* Don't send ICMP messages in response to ICMP messages */ if (IP6H_NEXTH(iphdr) != IP6_NEXTH_ICMP6) { icmp6_time_exceeded(p, ICMP6_TE_HL); } #endif /* LWIP_ICMP6 */ IP6_STATS_INC(ip6.drop); return; } if (netif->mtu && (p->tot_len > netif->mtu)) { #if LWIP_ICMP6 /* Don't send ICMP messages in response to ICMP messages */ if (IP6H_NEXTH(iphdr) != IP6_NEXTH_ICMP6) { icmp6_packet_too_big(p, netif->mtu); } #endif /* LWIP_ICMP6 */ IP6_STATS_INC(ip6.drop); return; } LWIP_DEBUGF(IP6_DEBUG, ("ip6_forward: forwarding packet to %"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F"\n", IP6_ADDR_BLOCK1(ip6_current_dest_addr()), IP6_ADDR_BLOCK2(ip6_current_dest_addr()), IP6_ADDR_BLOCK3(ip6_current_dest_addr()), IP6_ADDR_BLOCK4(ip6_current_dest_addr()), IP6_ADDR_BLOCK5(ip6_current_dest_addr()), IP6_ADDR_BLOCK6(ip6_current_dest_addr()), IP6_ADDR_BLOCK7(ip6_current_dest_addr()), IP6_ADDR_BLOCK8(ip6_current_dest_addr()))); /* transmit pbuf on chosen interface */ netif->output_ip6(netif, p, ip6_current_dest_addr()); IP6_STATS_INC(ip6.fw); IP6_STATS_INC(ip6.xmit); return; } #endif /* LWIP_IPV6_FORWARD */ /** Return true if the current input packet should be accepted on this netif */ static int ip6_input_accept(struct netif *netif) { /* interface is up? */ if (netif_is_up(netif)) { u8_t i; /* unicast to this interface address? address configured? */ /* If custom scopes are used, the destination zone will be tested as * part of the local-address comparison, but we need to test the source * scope as well (e.g., is this interface on the same link?). */ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i)) && ip6_addr_eq(ip6_current_dest_addr(), netif_ip6_addr(netif, i)) #if IPV6_CUSTOM_SCOPES && (!ip6_addr_has_zone(ip6_current_src_addr()) || ip6_addr_test_zone(ip6_current_src_addr(), netif)) #endif /* IPV6_CUSTOM_SCOPES */ ) { /* accept on this netif */ return 1; } } } return 0; } /** * This function is called by the network interface device driver when * an IPv6 packet is received. The function does the basic checks of the * IP header such as packet size being at least larger than the header * size etc. If the packet was not destined for us, the packet is * forwarded (using ip6_forward). * * Finally, the packet is sent to the upper layer protocol input function. * * @param p the received IPv6 packet (p->payload points to IPv6 header) * @param inp the netif on which this packet was received * @return ERR_OK if the packet was processed (could return ERR_* if it wasn't * processed, but currently always returns ERR_OK) */ err_t ip6_input(struct pbuf *p, struct netif *inp) { struct ip6_hdr *ip6hdr; struct netif *netif; const u8_t *nexth; u16_t hlen, hlen_tot; /* the current header length */ #if 0 /*IP_ACCEPT_LINK_LAYER_ADDRESSING*/ @todo int check_ip_src=1; #endif /* IP_ACCEPT_LINK_LAYER_ADDRESSING */ #if LWIP_RAW raw_input_state_t raw_status; #endif /* LWIP_RAW */ LWIP_ASSERT_CORE_LOCKED(); IP6_STATS_INC(ip6.recv); /* identify the IP header */ ip6hdr = (struct ip6_hdr *)p->payload; if (IP6H_V(ip6hdr) != 6) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_WARNING, ("IPv6 packet dropped due to bad version number %"U32_F"\n", IP6H_V(ip6hdr))); pbuf_free(p); IP6_STATS_INC(ip6.err); IP6_STATS_INC(ip6.drop); return ERR_OK; } #ifdef LWIP_HOOK_IP6_INPUT if (LWIP_HOOK_IP6_INPUT(p, inp)) { /* the packet has been eaten */ return ERR_OK; } #endif /* header length exceeds first pbuf length, or ip length exceeds total pbuf length? */ if ((IP6_HLEN > p->len) || (IP6H_PLEN(ip6hdr) > (p->tot_len - IP6_HLEN))) { if (IP6_HLEN > p->len) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 header (len %"U16_F") does not fit in first pbuf (len %"U16_F"), IP packet dropped.\n", (u16_t)IP6_HLEN, p->len)); } if ((IP6H_PLEN(ip6hdr) + IP6_HLEN) > p->tot_len) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 (plen %"U16_F") is longer than pbuf (len %"U16_F"), IP packet dropped.\n", (u16_t)(IP6H_PLEN(ip6hdr) + IP6_HLEN), p->tot_len)); } /* free (drop) packet pbufs */ pbuf_free(p); IP6_STATS_INC(ip6.lenerr); IP6_STATS_INC(ip6.drop); return ERR_OK; } /* Trim pbuf. This should have been done at the netif layer, * but we'll do it anyway just to be sure that its done. */ pbuf_realloc(p, (u16_t)(IP6_HLEN + IP6H_PLEN(ip6hdr))); /* copy IP addresses to aligned ip6_addr_t */ ip_addr_copy_from_ip6_packed(ip_data.current_iphdr_dest, ip6hdr->dest); ip_addr_copy_from_ip6_packed(ip_data.current_iphdr_src, ip6hdr->src); /* Don't accept virtual IPv4 mapped IPv6 addresses. * Don't accept multicast source addresses. */ if (ip6_addr_isipv4mappedipv6(ip_2_ip6(&ip_data.current_iphdr_dest)) || ip6_addr_isipv4mappedipv6(ip_2_ip6(&ip_data.current_iphdr_src)) || ip6_addr_ismulticast(ip_2_ip6(&ip_data.current_iphdr_src))) { /* free (drop) packet pbufs */ pbuf_free(p); IP6_STATS_INC(ip6.err); IP6_STATS_INC(ip6.drop); return ERR_OK; } /* Set the appropriate zone identifier on the addresses. */ ip6_addr_assign_zone(ip_2_ip6(&ip_data.current_iphdr_dest), IP6_UNKNOWN, inp); ip6_addr_assign_zone(ip_2_ip6(&ip_data.current_iphdr_src), IP6_UNICAST, inp); /* current header pointer. */ ip_data.current_ip6_header = ip6hdr; /* In netif, used in case we need to send ICMPv6 packets back. */ ip_data.current_netif = inp; ip_data.current_input_netif = inp; /* match packet against an interface, i.e. is this packet for us? */ if (ip6_addr_ismulticast(ip6_current_dest_addr())) { /* Always joined to multicast if-local and link-local all-nodes group. */ if (ip6_addr_isallnodes_iflocal(ip6_current_dest_addr()) || ip6_addr_isallnodes_linklocal(ip6_current_dest_addr())) { netif = inp; } #if LWIP_IPV6_MLD else if (mld6_lookfor_group(inp, ip6_current_dest_addr())) { netif = inp; } #else /* LWIP_IPV6_MLD */ else if (ip6_addr_issolicitednode(ip6_current_dest_addr())) { u8_t i; /* Filter solicited node packets when MLD is not enabled * (for Neighbor discovery). */ netif = NULL; for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(inp, i)) && ip6_addr_solicitednode_eq(ip6_current_dest_addr(), netif_ip6_addr(inp, i))) { netif = inp; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: solicited node packet accepted on interface %c%c\n", netif->name[0], netif->name[1])); break; } } } #endif /* LWIP_IPV6_MLD */ else { netif = NULL; } } else { /* start trying with inp. if that's not acceptable, start walking the list of configured netifs. */ if (ip6_input_accept(inp)) { netif = inp; } else { netif = NULL; #if !IPV6_CUSTOM_SCOPES /* Shortcut: stop looking for other interfaces if either the source or * the destination has a scope constrained to this interface. Custom * scopes may break the 1:1 link/interface mapping, however. */ if (ip6_addr_islinklocal(ip6_current_dest_addr()) || ip6_addr_islinklocal(ip6_current_src_addr())) { goto netif_found; } #endif /* !IPV6_CUSTOM_SCOPES */ #if !LWIP_NETIF_LOOPBACK || LWIP_HAVE_LOOPIF /* The loopback address is to be considered link-local. Packets to it * should be dropped on other interfaces, as per RFC 4291 Sec. 2.5.3. * Its implied scope means packets *from* the loopback address should * not be accepted on other interfaces, either. These requirements * cannot be implemented in the case that loopback traffic is sent * across a non-loopback interface, however. */ if (ip6_addr_isloopback(ip6_current_dest_addr()) || ip6_addr_isloopback(ip6_current_src_addr())) { goto netif_found; } #endif /* !LWIP_NETIF_LOOPBACK || LWIP_HAVE_LOOPIF */ #if !LWIP_SINGLE_NETIF NETIF_FOREACH(netif) { if (netif == inp) { /* we checked that before already */ continue; } if (ip6_input_accept(netif)) { break; } } #endif /* !LWIP_SINGLE_NETIF */ } netif_found: LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet accepted on interface %c%c\n", netif ? netif->name[0] : 'X', netif? netif->name[1] : 'X')); } /* "::" packet source address? (used in duplicate address detection) */ if (ip6_addr_isany(ip6_current_src_addr()) && (!ip6_addr_issolicitednode(ip6_current_dest_addr()))) { /* packet source is not valid */ /* free (drop) packet pbufs */ LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with src ANY_ADDRESS dropped\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } /* packet not for us? */ if (netif == NULL) { /* packet not for us, route or discard */ LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_TRACE, ("ip6_input: packet not for us.\n")); #if LWIP_IPV6_FORWARD /* non-multicast packet? */ if (!ip6_addr_ismulticast(ip6_current_dest_addr())) { /* try to forward IP packet on (other) interfaces */ ip6_forward(p, ip6hdr, inp); } #endif /* LWIP_IPV6_FORWARD */ pbuf_free(p); goto ip6_input_cleanup; } /* current netif pointer. */ ip_data.current_netif = netif; /* Save next header type. */ nexth = &IP6H_NEXTH(ip6hdr); /* Init header length. */ hlen = hlen_tot = IP6_HLEN; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: \n")); ip6_debug_print(p); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: p->len %"U16_F" p->tot_len %"U16_F"\n", p->len, p->tot_len)); /* Move to payload. */ pbuf_remove_header(p, IP6_HLEN); /* Process known option extension headers, if present. */ while (*nexth != IP6_NEXTH_NONE) { switch (*nexth) { case IP6_NEXTH_HOPBYHOP: { s32_t opt_offset; struct ip6_hbh_hdr *hbh_hdr; struct ip6_opt_hdr *opt_hdr; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Hop-by-Hop options header\n")); /* Get and check the header length, while staying in packet bounds. */ hbh_hdr = (struct ip6_hbh_hdr *)p->payload; /* Get next header type. */ nexth = &IP6_HBH_NEXTH(hbh_hdr); /* Get the header length. */ hlen = (u16_t)(8 * (1 + hbh_hdr->_hlen)); if ((p->len < 8) || (hlen > p->len)) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 options header (hlen %"U16_F") does not fit in first pbuf (len %"U16_F"), IPv6 packet dropped.\n", hlen, p->len)); /* free (drop) packet pbufs */ pbuf_free(p); IP6_STATS_INC(ip6.lenerr); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } hlen_tot = (u16_t)(hlen_tot + hlen); /* The extended option header starts right after Hop-by-Hop header. */ opt_offset = IP6_HBH_HLEN; while (opt_offset < hlen) { s32_t opt_dlen = 0; opt_hdr = (struct ip6_opt_hdr *)((u8_t *)hbh_hdr + opt_offset); switch (IP6_OPT_TYPE(opt_hdr)) { /* @todo: process IPV6 Hop-by-Hop option data */ case IP6_PAD1_OPTION: /* PAD1 option doesn't have length and value field */ opt_dlen = -1; break; case IP6_PADN_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; case IP6_ROUTER_ALERT_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; case IP6_JUMBO_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; default: /* Check 2 MSB of Hop-by-Hop header type. */ switch (IP6_OPT_TYPE_ACTION(opt_hdr)) { case 1: /* Discard the packet. */ LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid Hop-by-Hop option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; case 2: /* Send ICMP Parameter Problem */ icmp6_param_problem(p, ICMP6_PP_OPTION, opt_hdr); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid Hop-by-Hop option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; case 3: /* Send ICMP Parameter Problem if destination address is not a multicast address */ if (!ip6_addr_ismulticast(ip6_current_dest_addr())) { icmp6_param_problem(p, ICMP6_PP_OPTION, opt_hdr); } LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid Hop-by-Hop option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; default: /* Skip over this option. */ opt_dlen = IP6_OPT_DLEN(opt_hdr); break; } break; } /* Adjust the offset to move to the next extended option header */ opt_offset = opt_offset + IP6_OPT_HLEN + opt_dlen; } pbuf_remove_header(p, hlen); break; } case IP6_NEXTH_DESTOPTS: { s32_t opt_offset; struct ip6_dest_hdr *dest_hdr; struct ip6_opt_hdr *opt_hdr; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Destination options header\n")); dest_hdr = (struct ip6_dest_hdr *)p->payload; /* Get next header type. */ nexth = &IP6_DEST_NEXTH(dest_hdr); /* Get the header length. */ hlen = 8 * (1 + dest_hdr->_hlen); if ((p->len < 8) || (hlen > p->len)) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 options header (hlen %"U16_F") does not fit in first pbuf (len %"U16_F"), IPv6 packet dropped.\n", hlen, p->len)); /* free (drop) packet pbufs */ pbuf_free(p); IP6_STATS_INC(ip6.lenerr); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } hlen_tot = (u16_t)(hlen_tot + hlen); /* The extended option header starts right after Destination header. */ opt_offset = IP6_DEST_HLEN; while (opt_offset < hlen) { s32_t opt_dlen = 0; opt_hdr = (struct ip6_opt_hdr *)((u8_t *)dest_hdr + opt_offset); switch (IP6_OPT_TYPE(opt_hdr)) { /* @todo: process IPV6 Destination option data */ case IP6_PAD1_OPTION: /* PAD1 option deosn't have length and value field */ opt_dlen = -1; break; case IP6_PADN_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; case IP6_ROUTER_ALERT_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; case IP6_JUMBO_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; case IP6_HOME_ADDRESS_OPTION: opt_dlen = IP6_OPT_DLEN(opt_hdr); break; default: /* Check 2 MSB of Destination header type. */ switch (IP6_OPT_TYPE_ACTION(opt_hdr)) { case 1: /* Discard the packet. */ LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid destination option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; case 2: /* Send ICMP Parameter Problem */ icmp6_param_problem(p, ICMP6_PP_OPTION, opt_hdr); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid destination option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; case 3: /* Send ICMP Parameter Problem if destination address is not a multicast address */ if (!ip6_addr_ismulticast(ip6_current_dest_addr())) { icmp6_param_problem(p, ICMP6_PP_OPTION, opt_hdr); } LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid destination option type dropped.\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; default: /* Skip over this option. */ opt_dlen = IP6_OPT_DLEN(opt_hdr); break; } break; } /* Adjust the offset to move to the next extended option header */ opt_offset = opt_offset + IP6_OPT_HLEN + opt_dlen; } pbuf_remove_header(p, hlen); break; } case IP6_NEXTH_ROUTING: { struct ip6_rout_hdr *rout_hdr; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Routing header\n")); rout_hdr = (struct ip6_rout_hdr *)p->payload; /* Get next header type. */ nexth = &IP6_ROUT_NEXTH(rout_hdr); /* Get the header length. */ hlen = 8 * (1 + rout_hdr->_hlen); if ((p->len < 8) || (hlen > p->len)) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 options header (hlen %"U16_F") does not fit in first pbuf (len %"U16_F"), IPv6 packet dropped.\n", hlen, p->len)); /* free (drop) packet pbufs */ pbuf_free(p); IP6_STATS_INC(ip6.lenerr); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } /* Skip over this header. */ hlen_tot = (u16_t)(hlen_tot + hlen); /* if segment left value is 0 in routing header, ignore the option */ if (IP6_ROUT_SEG_LEFT(rout_hdr)) { /* The length field of routing option header must be even */ if (rout_hdr->_hlen & 0x1) { /* Discard and send parameter field error */ icmp6_param_problem(p, ICMP6_PP_FIELD, &rout_hdr->_hlen); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid routing type dropped\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } switch (IP6_ROUT_TYPE(rout_hdr)) { /* TODO: process routing by the type */ case IP6_ROUT_TYPE2: break; case IP6_ROUT_RPL: break; default: /* Discard unrecognized routing type and send parameter field error */ icmp6_param_problem(p, ICMP6_PP_FIELD, &IP6_ROUT_TYPE(rout_hdr)); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid routing type dropped\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } } pbuf_remove_header(p, hlen); break; } case IP6_NEXTH_FRAGMENT: { struct ip6_frag_hdr *frag_hdr; LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Fragment header\n")); frag_hdr = (struct ip6_frag_hdr *)p->payload; /* Get next header type. */ nexth = &IP6_FRAG_NEXTH(frag_hdr); /* Fragment Header length. */ hlen = 8; /* Make sure this header fits in current pbuf. */ if (hlen > p->len) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IPv6 options header (hlen %"U16_F") does not fit in first pbuf (len %"U16_F"), IPv6 packet dropped.\n", hlen, p->len)); /* free (drop) packet pbufs */ pbuf_free(p); IP6_FRAG_STATS_INC(ip6_frag.lenerr); IP6_FRAG_STATS_INC(ip6_frag.drop); goto ip6_input_cleanup; } hlen_tot = (u16_t)(hlen_tot + hlen); /* check payload length is multiple of 8 octets when mbit is set */ if (IP6_FRAG_MBIT(frag_hdr) && (IP6H_PLEN(ip6hdr) & 0x7)) { /* ipv6 payload length is not multiple of 8 octets */ icmp6_param_problem(p, ICMP6_PP_FIELD, LWIP_PACKED_CAST(const void *, &ip6hdr->_plen)); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with invalid payload length dropped\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } /* Offset == 0 and more_fragments == 0? */ if ((frag_hdr->_fragment_offset & PP_HTONS(IP6_FRAG_OFFSET_MASK | IP6_FRAG_MORE_FLAG)) == 0) { /* This is a 1-fragment packet. Skip this header and continue. */ pbuf_remove_header(p, hlen); } else { #if LWIP_IPV6_REASS /* reassemble the packet */ ip_data.current_ip_header_tot_len = hlen_tot; p = ip6_reass(p); /* packet not fully reassembled yet? */ if (p == NULL) { goto ip6_input_cleanup; } /* Returned p point to IPv6 header. * Update all our variables and pointers and continue. */ ip6hdr = (struct ip6_hdr *)p->payload; nexth = &IP6H_NEXTH(ip6hdr); hlen = hlen_tot = IP6_HLEN; pbuf_remove_header(p, IP6_HLEN); #else /* LWIP_IPV6_REASS */ /* free (drop) packet pbufs */ LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Fragment header dropped (with LWIP_IPV6_REASS==0)\n")); pbuf_free(p); IP6_STATS_INC(ip6.opterr); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; #endif /* LWIP_IPV6_REASS */ } break; } default: goto options_done; } if (*nexth == IP6_NEXTH_HOPBYHOP) { /* Hop-by-Hop header comes only as a first option */ icmp6_param_problem(p, ICMP6_PP_HEADER, nexth); LWIP_DEBUGF(IP6_DEBUG, ("ip6_input: packet with Hop-by-Hop options header dropped (only valid as a first option)\n")); pbuf_free(p); IP6_STATS_INC(ip6.drop); goto ip6_input_cleanup; } } options_done: /* send to upper layers */ ip_data.current_ip_header_tot_len = hlen_tot; #if LWIP_RAW /* p points to IPv6 header again for raw_input. */ pbuf_add_header_force(p, hlen_tot); /* raw input did not eat the packet? */ raw_status = raw_input(p, inp); if (raw_status != RAW_INPUT_EATEN) { /* Point to payload. */ pbuf_remove_header(p, hlen_tot); #else /* LWIP_RAW */ { #endif /* LWIP_RAW */ switch (*nexth) { case IP6_NEXTH_NONE: pbuf_free(p); break; #if LWIP_UDP case IP6_NEXTH_UDP: #if LWIP_UDPLITE case IP6_NEXTH_UDPLITE: #endif /* LWIP_UDPLITE */ udp_input(p, inp); break; #endif /* LWIP_UDP */ #if LWIP_TCP case IP6_NEXTH_TCP: tcp_input(p, inp); break; #endif /* LWIP_TCP */ #if LWIP_ICMP6 case IP6_NEXTH_ICMP6: icmp6_input(p, inp); break; #endif /* LWIP_ICMP */ default: #if LWIP_RAW if (raw_status == RAW_INPUT_DELIVERED) { /* @todo: ipv6 mib in-delivers? */ } else #endif /* LWIP_RAW */ { #if LWIP_ICMP6 /* p points to IPv6 header again for raw_input. */ pbuf_add_header_force(p, hlen_tot); /* send ICMP parameter problem unless it was a multicast or ICMPv6 */ if ((!ip6_addr_ismulticast(ip6_current_dest_addr())) && (IP6H_NEXTH(ip6hdr) != IP6_NEXTH_ICMP6)) { icmp6_param_problem(p, ICMP6_PP_HEADER, nexth); } #endif /* LWIP_ICMP */ LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip6_input: Unsupported transport protocol %"U16_F"\n", (u16_t)IP6H_NEXTH(ip6hdr))); IP6_STATS_INC(ip6.proterr); IP6_STATS_INC(ip6.drop); } pbuf_free(p); break; } } ip6_input_cleanup: ip_data.current_netif = NULL; ip_data.current_input_netif = NULL; ip_data.current_ip6_header = NULL; ip_data.current_ip_header_tot_len = 0; ip6_addr_set_zero(ip6_current_src_addr()); ip6_addr_set_zero(ip6_current_dest_addr()); return ERR_OK; } /** * Sends an IPv6 packet on a network interface. This function constructs * the IPv6 header. If the source IPv6 address is NULL, the IPv6 "ANY" address is * used as source (usually during network startup). If the source IPv6 address it * IP6_ADDR_ANY, the most appropriate IPv6 address of the outgoing network * interface is filled in as source address. If the destination IPv6 address is * LWIP_IP_HDRINCL, p is assumed to already include an IPv6 header and * p->payload points to it instead of the data. * * @param p the packet to send (p->payload points to the data, e.g. next protocol header; if dest == LWIP_IP_HDRINCL, p already includes an IPv6 header and p->payload points to that IPv6 header) * @param src the source IPv6 address to send from (if src == IP6_ADDR_ANY, an * IP address of the netif is selected and used as source address. * if src == NULL, IP6_ADDR_ANY is used as source) (src is possibly not * properly zoned) * @param dest the destination IPv6 address to send the packet to (possibly not * properly zoned) * @param hl the Hop Limit value to be set in the IPv6 header * @param tc the Traffic Class value to be set in the IPv6 header * @param nexth the Next Header to be set in the IPv6 header * @param netif the netif on which to send this packet * @return ERR_OK if the packet was sent OK * ERR_BUF if p doesn't have enough space for IPv6/LINK headers * returns errors returned by netif->output_ip6 */ err_t ip6_output_if(struct pbuf *p, const ip6_addr_t *src, const ip6_addr_t *dest, u8_t hl, u8_t tc, u8_t nexth, struct netif *netif) { const ip6_addr_t *src_used = src; if (dest != LWIP_IP_HDRINCL) { if (src != NULL && ip6_addr_isany(src)) { src_used = ip_2_ip6(ip6_select_source_address(netif, dest)); if ((src_used == NULL) || ip6_addr_isany(src_used)) { /* No appropriate source address was found for this packet. */ LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip6_output: No suitable source address for packet.\n")); IP6_STATS_INC(ip6.rterr); return ERR_RTE; } } } return ip6_output_if_src(p, src_used, dest, hl, tc, nexth, netif); } /** * Same as ip6_output_if() but 'src' address is not replaced by netif address * when it is 'any'. */ err_t ip6_output_if_src(struct pbuf *p, const ip6_addr_t *src, const ip6_addr_t *dest, u8_t hl, u8_t tc, u8_t nexth, struct netif *netif) { struct ip6_hdr *ip6hdr; ip6_addr_t dest_addr; LWIP_ASSERT_CORE_LOCKED(); LWIP_IP_CHECK_PBUF_REF_COUNT_FOR_TX(p); /* Should the IPv6 header be generated or is it already included in p? */ if (dest != LWIP_IP_HDRINCL) { #if LWIP_IPV6_SCOPES /* If the destination address is scoped but lacks a zone, add a zone now, * based on the outgoing interface. The lower layers (e.g., nd6) absolutely * require addresses to be properly zoned for correctness. In some cases, * earlier attempts will have been made to add a zone to the destination, * but this function is the only one that is called in all (other) cases, * so we must do this here. */ if (ip6_addr_lacks_zone(dest, IP6_UNKNOWN)) { ip6_addr_copy(dest_addr, *dest); ip6_addr_assign_zone(&dest_addr, IP6_UNKNOWN, netif); dest = &dest_addr; } #endif /* LWIP_IPV6_SCOPES */ /* generate IPv6 header */ if (pbuf_add_header(p, IP6_HLEN)) { LWIP_DEBUGF(IP6_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip6_output: not enough room for IPv6 header in pbuf\n")); IP6_STATS_INC(ip6.err); return ERR_BUF; } ip6hdr = (struct ip6_hdr *)p->payload; LWIP_ASSERT("check that first pbuf can hold struct ip6_hdr", (p->len >= sizeof(struct ip6_hdr))); IP6H_HOPLIM_SET(ip6hdr, hl); IP6H_NEXTH_SET(ip6hdr, nexth); /* dest cannot be NULL here */ ip6_addr_copy_to_packed(ip6hdr->dest, *dest); IP6H_VTCFL_SET(ip6hdr, 6, tc, 0); IP6H_PLEN_SET(ip6hdr, (u16_t)(p->tot_len - IP6_HLEN)); if (src == NULL) { src = IP6_ADDR_ANY6; } /* src cannot be NULL here */ ip6_addr_copy_to_packed(ip6hdr->src, *src); } else { /* IP header already included in p */ ip6hdr = (struct ip6_hdr *)p->payload; ip6_addr_copy_from_packed(dest_addr, ip6hdr->dest); ip6_addr_assign_zone(&dest_addr, IP6_UNKNOWN, netif); dest = &dest_addr; } IP6_STATS_INC(ip6.xmit); LWIP_DEBUGF(IP6_DEBUG, ("ip6_output_if: %c%c%"U16_F"\n", netif->name[0], netif->name[1], (u16_t)netif->num)); ip6_debug_print(p); #if ENABLE_LOOPBACK { int i; #if !LWIP_HAVE_LOOPIF if (ip6_addr_isloopback(dest)) { return netif_loop_output(netif, p); } #endif /* !LWIP_HAVE_LOOPIF */ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) { if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i)) && ip6_addr_eq(dest, netif_ip6_addr(netif, i))) { /* Packet to self, enqueue it for loopback */ LWIP_DEBUGF(IP6_DEBUG, ("netif_loop_output()\n")); return netif_loop_output(netif, p); } } } #if LWIP_MULTICAST_TX_OPTIONS if ((p->flags & PBUF_FLAG_MCASTLOOP) != 0) { netif_loop_output(netif, p); } #endif /* LWIP_MULTICAST_TX_OPTIONS */ #endif /* ENABLE_LOOPBACK */ #if LWIP_IPV6_FRAG /* don't fragment if interface has mtu set to 0 [loopif] */ if (netif_mtu6(netif) && (p->tot_len > nd6_get_destination_mtu(dest, netif))) { return ip6_frag(p, netif, dest); } #endif /* LWIP_IPV6_FRAG */ LWIP_DEBUGF(IP6_DEBUG, ("netif->output_ip6()\n")); return netif->output_ip6(netif, p, dest); } /** * Simple interface to ip6_output_if. It finds the outgoing network * interface and calls upon ip6_output_if to do the actual work. * * @param p the packet to send (p->payload points to the data, e.g. next protocol header; if dest == LWIP_IP_HDRINCL, p already includes an IPv6 header and p->payload points to that IPv6 header) * @param src the source IPv6 address to send from (if src == IP6_ADDR_ANY, an * IP address of the netif is selected and used as source address. * if src == NULL, IP6_ADDR_ANY is used as source) * @param dest the destination IPv6 address to send the packet to * @param hl the Hop Limit value to be set in the IPv6 header * @param tc the Traffic Class value to be set in the IPv6 header * @param nexth the Next Header to be set in the IPv6 header * * @return ERR_RTE if no route is found * see ip_output_if() for more return values */ err_t ip6_output(struct pbuf *p, const ip6_addr_t *src, const ip6_addr_t *dest, u8_t hl, u8_t tc, u8_t nexth) { struct netif *netif; struct ip6_hdr *ip6hdr; ip6_addr_t src_addr, dest_addr; LWIP_IP_CHECK_PBUF_REF_COUNT_FOR_TX(p); if (dest != LWIP_IP_HDRINCL) { netif = ip6_route(src, dest); } else { /* IP header included in p, read addresses. */ ip6hdr = (struct ip6_hdr *)p->payload; ip6_addr_copy_from_packed(src_addr, ip6hdr->src); ip6_addr_copy_from_packed(dest_addr, ip6hdr->dest); netif = ip6_route(&src_addr, &dest_addr); dest = &dest_addr; } if (netif == NULL) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_output: no route for %"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F"\n", IP6_ADDR_BLOCK1(dest), IP6_ADDR_BLOCK2(dest), IP6_ADDR_BLOCK3(dest), IP6_ADDR_BLOCK4(dest), IP6_ADDR_BLOCK5(dest), IP6_ADDR_BLOCK6(dest), IP6_ADDR_BLOCK7(dest), IP6_ADDR_BLOCK8(dest))); IP6_STATS_INC(ip6.rterr); return ERR_RTE; } return ip6_output_if(p, src, dest, hl, tc, nexth, netif); } #if LWIP_NETIF_USE_HINTS /** Like ip6_output, but takes and addr_hint pointer that is passed on to netif->addr_hint * before calling ip6_output_if. * * @param p the packet to send (p->payload points to the data, e.g. next protocol header; if dest == LWIP_IP_HDRINCL, p already includes an IPv6 header and p->payload points to that IPv6 header) * @param src the source IPv6 address to send from (if src == IP6_ADDR_ANY, an * IP address of the netif is selected and used as source address. * if src == NULL, IP6_ADDR_ANY is used as source) * @param dest the destination IPv6 address to send the packet to * @param hl the Hop Limit value to be set in the IPv6 header * @param tc the Traffic Class value to be set in the IPv6 header * @param nexth the Next Header to be set in the IPv6 header * @param netif_hint netif output hint pointer set to netif->hint before * calling ip_output_if() * * @return ERR_RTE if no route is found * see ip_output_if() for more return values */ err_t ip6_output_hinted(struct pbuf *p, const ip6_addr_t *src, const ip6_addr_t *dest, u8_t hl, u8_t tc, u8_t nexth, struct netif_hint *netif_hint) { struct netif *netif; struct ip6_hdr *ip6hdr; ip6_addr_t src_addr, dest_addr; err_t err; LWIP_IP_CHECK_PBUF_REF_COUNT_FOR_TX(p); if (dest != LWIP_IP_HDRINCL) { netif = ip6_route(src, dest); } else { /* IP header included in p, read addresses. */ ip6hdr = (struct ip6_hdr *)p->payload; ip6_addr_copy_from_packed(src_addr, ip6hdr->src); ip6_addr_copy_from_packed(dest_addr, ip6hdr->dest); netif = ip6_route(&src_addr, &dest_addr); dest = &dest_addr; } if (netif == NULL) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_output: no route for %"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F":%"X16_F"\n", IP6_ADDR_BLOCK1(dest), IP6_ADDR_BLOCK2(dest), IP6_ADDR_BLOCK3(dest), IP6_ADDR_BLOCK4(dest), IP6_ADDR_BLOCK5(dest), IP6_ADDR_BLOCK6(dest), IP6_ADDR_BLOCK7(dest), IP6_ADDR_BLOCK8(dest))); IP6_STATS_INC(ip6.rterr); return ERR_RTE; } NETIF_SET_HINTS(netif, netif_hint); err = ip6_output_if(p, src, dest, hl, tc, nexth, netif); NETIF_RESET_HINTS(netif); return err; } #endif /* LWIP_NETIF_USE_HINTS*/ #if LWIP_IPV6_MLD /** * Add a hop-by-hop options header with a router alert option and padding. * * Used by MLD when sending a Multicast listener report/done message. * * @param p the packet to which we will prepend the options header * @param nexth the next header protocol number (e.g. IP6_NEXTH_ICMP6) * @param value the value of the router alert option data (e.g. IP6_ROUTER_ALERT_VALUE_MLD) * @return ERR_OK if hop-by-hop header was added, ERR_* otherwise */ err_t ip6_options_add_hbh_ra(struct pbuf *p, u8_t nexth, u8_t value) { u8_t *opt_data; u32_t offset = 0; struct ip6_hbh_hdr *hbh_hdr; struct ip6_opt_hdr *opt_hdr; /* fixed 4 bytes for router alert option and 2 bytes padding */ const u8_t hlen = (sizeof(struct ip6_opt_hdr) * 2) + IP6_ROUTER_ALERT_DLEN; /* Move pointer to make room for hop-by-hop options header. */ if (pbuf_add_header(p, sizeof(struct ip6_hbh_hdr) + hlen)) { LWIP_DEBUGF(IP6_DEBUG, ("ip6_options: no space for options header\n")); IP6_STATS_INC(ip6.err); return ERR_BUF; } /* Set fields of Hop-by-Hop header */ hbh_hdr = (struct ip6_hbh_hdr *)p->payload; IP6_HBH_NEXTH(hbh_hdr) = nexth; hbh_hdr->_hlen = 0; offset = IP6_HBH_HLEN; /* Set router alert options to Hop-by-Hop extended option header */ opt_hdr = (struct ip6_opt_hdr *)((u8_t *)hbh_hdr + offset); IP6_OPT_TYPE(opt_hdr) = IP6_ROUTER_ALERT_OPTION; IP6_OPT_DLEN(opt_hdr) = IP6_ROUTER_ALERT_DLEN; offset += IP6_OPT_HLEN; /* Set router alert option data */ opt_data = (u8_t *)hbh_hdr + offset; opt_data[0] = value; opt_data[1] = 0; offset += IP6_OPT_DLEN(opt_hdr); /* add 2 bytes padding to make 8 bytes Hop-by-Hop header length */ opt_hdr = (struct ip6_opt_hdr *)((u8_t *)hbh_hdr + offset); IP6_OPT_TYPE(opt_hdr) = IP6_PADN_OPTION; IP6_OPT_DLEN(opt_hdr) = 0; return ERR_OK; } #endif /* LWIP_IPV6_MLD */ #if IP6_DEBUG /* Print an IPv6 header by using LWIP_DEBUGF * @param p an IPv6 packet, p->payload pointing to the IPv6 header */ void ip6_debug_print(struct pbuf *p) { struct ip6_hdr *ip6hdr = (struct ip6_hdr *)p->payload; LWIP_DEBUGF(IP6_DEBUG, ("IPv6 header:\n")); LWIP_DEBUGF(IP6_DEBUG, ("+-------------------------------+\n")); LWIP_DEBUGF(IP6_DEBUG, ("| %2"U16_F" | %3"U16_F" | %7"U32_F" | (ver, class, flow)\n", IP6H_V(ip6hdr), IP6H_TC(ip6hdr), IP6H_FL(ip6hdr))); LWIP_DEBUGF(IP6_DEBUG, ("+-------------------------------+\n")); LWIP_DEBUGF(IP6_DEBUG, ("| %5"U16_F" | %3"U16_F" | %3"U16_F" | (plen, nexth, hopl)\n", IP6H_PLEN(ip6hdr), IP6H_NEXTH(ip6hdr), IP6H_HOPLIM(ip6hdr))); LWIP_DEBUGF(IP6_DEBUG, ("+-------------------------------+\n")); LWIP_DEBUGF(IP6_DEBUG, ("| %4"X32_F" | %4"X32_F" | %4"X32_F" | %4"X32_F" | (src)\n", IP6_ADDR_BLOCK1(&(ip6hdr->src)), IP6_ADDR_BLOCK2(&(ip6hdr->src)), IP6_ADDR_BLOCK3(&(ip6hdr->src)), IP6_ADDR_BLOCK4(&(ip6hdr->src)))); LWIP_DEBUGF(IP6_DEBUG, ("| %4"X32_F" | %4"X32_F" | %4"X32_F" | %4"X32_F" |\n", IP6_ADDR_BLOCK5(&(ip6hdr->src)), IP6_ADDR_BLOCK6(&(ip6hdr->src)), IP6_ADDR_BLOCK7(&(ip6hdr->src)), IP6_ADDR_BLOCK8(&(ip6hdr->src)))); LWIP_DEBUGF(IP6_DEBUG, ("+-------------------------------+\n")); LWIP_DEBUGF(IP6_DEBUG, ("| %4"X32_F" | %4"X32_F" | %4"X32_F" | %4"X32_F" | (dest)\n", IP6_ADDR_BLOCK1(&(ip6hdr->dest)), IP6_ADDR_BLOCK2(&(ip6hdr->dest)), IP6_ADDR_BLOCK3(&(ip6hdr->dest)), IP6_ADDR_BLOCK4(&(ip6hdr->dest)))); LWIP_DEBUGF(IP6_DEBUG, ("| %4"X32_F" | %4"X32_F" | %4"X32_F" | %4"X32_F" |\n", IP6_ADDR_BLOCK5(&(ip6hdr->dest)), IP6_ADDR_BLOCK6(&(ip6hdr->dest)), IP6_ADDR_BLOCK7(&(ip6hdr->dest)), IP6_ADDR_BLOCK8(&(ip6hdr->dest)))); LWIP_DEBUGF(IP6_DEBUG, ("+-------------------------------+\n")); } #endif /* IP6_DEBUG */ #endif /* LWIP_IPV6 */