1 /** @file 2 Implementation of Neighbor Discovery support routines. 3 4 Copyright (c) 2009 - 2012, Intel Corporation. All rights reserved.<BR> 5 6 This program and the accompanying materials 7 are licensed and made available under the terms and conditions of the BSD License 8 which accompanies this distribution. The full text of the license may be found at 9 http://opensource.org/licenses/bsd-license.php. 10 11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. 13 14 **/ 15 16 #include "Ip6Impl.h" 17 18 EFI_MAC_ADDRESS mZeroMacAddress; 19 20 /** 21 Update the ReachableTime in IP6 service binding instance data, in milliseconds. 22 23 @param[in, out] IpSb Points to the IP6_SERVICE. 24 25 **/ 26 VOID 27 Ip6UpdateReachableTime ( 28 IN OUT IP6_SERVICE *IpSb 29 ) 30 { 31 UINT32 Random; 32 33 Random = (NetRandomInitSeed () / 4294967295UL) * IP6_RANDOM_FACTOR_SCALE; 34 Random = Random + IP6_MIN_RANDOM_FACTOR_SCALED; 35 IpSb->ReachableTime = (IpSb->BaseReachableTime * Random) / IP6_RANDOM_FACTOR_SCALE; 36 } 37 38 /** 39 Build a array of EFI_IP6_NEIGHBOR_CACHE to be returned to the caller. The number 40 of EFI_IP6_NEIGHBOR_CACHE is also returned. 41 42 @param[in] IpInstance The pointer to IP6_PROTOCOL instance. 43 @param[out] NeighborCount The number of returned neighbor cache entries. 44 @param[out] NeighborCache The pointer to the array of EFI_IP6_NEIGHBOR_CACHE. 45 46 @retval EFI_SUCCESS The EFI_IP6_NEIGHBOR_CACHE successfully built. 47 @retval EFI_OUT_OF_RESOURCES Failed to allocate the memory for the route table. 48 49 **/ 50 EFI_STATUS 51 Ip6BuildEfiNeighborCache ( 52 IN IP6_PROTOCOL *IpInstance, 53 OUT UINT32 *NeighborCount, 54 OUT EFI_IP6_NEIGHBOR_CACHE **NeighborCache 55 ) 56 { 57 IP6_NEIGHBOR_ENTRY *Neighbor; 58 LIST_ENTRY *Entry; 59 IP6_SERVICE *IpSb; 60 UINT32 Count; 61 EFI_IP6_NEIGHBOR_CACHE *EfiNeighborCache; 62 EFI_IP6_NEIGHBOR_CACHE *NeighborCacheTmp; 63 64 NET_CHECK_SIGNATURE (IpInstance, IP6_PROTOCOL_SIGNATURE); 65 ASSERT (NeighborCount != NULL && NeighborCache != NULL); 66 67 IpSb = IpInstance->Service; 68 Count = 0; 69 70 NET_LIST_FOR_EACH (Entry, &IpSb->NeighborTable) { 71 Count++; 72 } 73 74 if (Count == 0) { 75 return EFI_SUCCESS; 76 } 77 78 NeighborCacheTmp = AllocatePool (Count * sizeof (EFI_IP6_NEIGHBOR_CACHE)); 79 if (NeighborCacheTmp == NULL) { 80 return EFI_OUT_OF_RESOURCES; 81 } 82 83 *NeighborCount = Count; 84 Count = 0; 85 86 NET_LIST_FOR_EACH (Entry, &IpSb->NeighborTable) { 87 Neighbor = NET_LIST_USER_STRUCT (Entry, IP6_NEIGHBOR_ENTRY, Link); 88 89 EfiNeighborCache = NeighborCacheTmp + Count; 90 91 EfiNeighborCache->State = Neighbor->State; 92 IP6_COPY_ADDRESS (&EfiNeighborCache->Neighbor, &Neighbor->Neighbor); 93 IP6_COPY_LINK_ADDRESS (&EfiNeighborCache->LinkAddress, &Neighbor->LinkAddress); 94 95 Count++; 96 } 97 98 ASSERT (*NeighborCount == Count); 99 *NeighborCache = NeighborCacheTmp; 100 101 return EFI_SUCCESS; 102 } 103 104 /** 105 Build a array of EFI_IP6_ADDRESS_INFO to be returned to the caller. The number 106 of prefix entries is also returned. 107 108 @param[in] IpInstance The pointer to IP6_PROTOCOL instance. 109 @param[out] PrefixCount The number of returned prefix entries. 110 @param[out] PrefixTable The pointer to the array of PrefixTable. 111 112 @retval EFI_SUCCESS The prefix table successfully built. 113 @retval EFI_OUT_OF_RESOURCES Failed to allocate the memory for the prefix table. 114 115 **/ 116 EFI_STATUS 117 Ip6BuildPrefixTable ( 118 IN IP6_PROTOCOL *IpInstance, 119 OUT UINT32 *PrefixCount, 120 OUT EFI_IP6_ADDRESS_INFO **PrefixTable 121 ) 122 { 123 LIST_ENTRY *Entry; 124 IP6_SERVICE *IpSb; 125 UINT32 Count; 126 IP6_PREFIX_LIST_ENTRY *PrefixList; 127 EFI_IP6_ADDRESS_INFO *EfiPrefix; 128 EFI_IP6_ADDRESS_INFO *PrefixTableTmp; 129 130 NET_CHECK_SIGNATURE (IpInstance, IP6_PROTOCOL_SIGNATURE); 131 ASSERT (PrefixCount != NULL && PrefixTable != NULL); 132 133 IpSb = IpInstance->Service; 134 Count = 0; 135 136 NET_LIST_FOR_EACH (Entry, &IpSb->OnlinkPrefix) { 137 Count++; 138 } 139 140 if (Count == 0) { 141 return EFI_SUCCESS; 142 } 143 144 PrefixTableTmp = AllocatePool (Count * sizeof (EFI_IP6_ADDRESS_INFO)); 145 if (PrefixTableTmp == NULL) { 146 return EFI_OUT_OF_RESOURCES; 147 } 148 149 *PrefixCount = Count; 150 Count = 0; 151 152 NET_LIST_FOR_EACH (Entry, &IpSb->OnlinkPrefix) { 153 PrefixList = NET_LIST_USER_STRUCT (Entry, IP6_PREFIX_LIST_ENTRY, Link); 154 EfiPrefix = PrefixTableTmp + Count; 155 IP6_COPY_ADDRESS (&EfiPrefix->Address, &PrefixList->Prefix); 156 EfiPrefix->PrefixLength = PrefixList->PrefixLength; 157 158 Count++; 159 } 160 161 ASSERT (*PrefixCount == Count); 162 *PrefixTable = PrefixTableTmp; 163 164 return EFI_SUCCESS; 165 } 166 167 /** 168 Allocate and initialize a IP6 prefix list entry. 169 170 @param[in] IpSb The pointer to IP6_SERVICE instance. 171 @param[in] OnLinkOrAuto If TRUE, the entry is created for the on link prefix list. 172 Otherwise, it is created for the autoconfiguration prefix list. 173 @param[in] ValidLifetime The length of time in seconds that the prefix 174 is valid for the purpose of on-link determination. 175 @param[in] PreferredLifetime The length of time in seconds that addresses 176 generated from the prefix via stateless address 177 autoconfiguration remain preferred. 178 @param[in] PrefixLength The prefix length of the Prefix. 179 @param[in] Prefix The prefix address. 180 181 @return NULL if it failed to allocate memory for the prefix node. Otherwise, point 182 to the created or existing prefix list entry. 183 184 **/ 185 IP6_PREFIX_LIST_ENTRY * 186 Ip6CreatePrefixListEntry ( 187 IN IP6_SERVICE *IpSb, 188 IN BOOLEAN OnLinkOrAuto, 189 IN UINT32 ValidLifetime, 190 IN UINT32 PreferredLifetime, 191 IN UINT8 PrefixLength, 192 IN EFI_IPv6_ADDRESS *Prefix 193 ) 194 { 195 IP6_PREFIX_LIST_ENTRY *PrefixEntry; 196 IP6_ROUTE_ENTRY *RtEntry; 197 LIST_ENTRY *ListHead; 198 LIST_ENTRY *Entry; 199 IP6_PREFIX_LIST_ENTRY *TmpPrefixEntry; 200 201 if (Prefix == NULL || PreferredLifetime > ValidLifetime || PrefixLength >= IP6_PREFIX_NUM) { 202 return NULL; 203 } 204 205 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 206 207 PrefixEntry = Ip6FindPrefixListEntry ( 208 IpSb, 209 OnLinkOrAuto, 210 PrefixLength, 211 Prefix 212 ); 213 if (PrefixEntry != NULL) { 214 PrefixEntry->RefCnt ++; 215 return PrefixEntry; 216 } 217 218 PrefixEntry = AllocatePool (sizeof (IP6_PREFIX_LIST_ENTRY)); 219 if (PrefixEntry == NULL) { 220 return NULL; 221 } 222 223 PrefixEntry->RefCnt = 1; 224 PrefixEntry->ValidLifetime = ValidLifetime; 225 PrefixEntry->PreferredLifetime = PreferredLifetime; 226 PrefixEntry->PrefixLength = PrefixLength; 227 IP6_COPY_ADDRESS (&PrefixEntry->Prefix, Prefix); 228 229 ListHead = OnLinkOrAuto ? &IpSb->OnlinkPrefix : &IpSb->AutonomousPrefix; 230 231 // 232 // Create a direct route entry for on-link prefix and insert to route area. 233 // 234 if (OnLinkOrAuto) { 235 RtEntry = Ip6CreateRouteEntry (Prefix, PrefixLength, NULL); 236 if (RtEntry == NULL) { 237 FreePool (PrefixEntry); 238 return NULL; 239 } 240 241 RtEntry->Flag = IP6_DIRECT_ROUTE; 242 InsertHeadList (&IpSb->RouteTable->RouteArea[PrefixLength], &RtEntry->Link); 243 IpSb->RouteTable->TotalNum++; 244 } 245 246 // 247 // Insert the prefix entry in the order that a prefix with longer prefix length 248 // is put ahead in the list. 249 // 250 NET_LIST_FOR_EACH (Entry, ListHead) { 251 TmpPrefixEntry = NET_LIST_USER_STRUCT(Entry, IP6_PREFIX_LIST_ENTRY, Link); 252 253 if (TmpPrefixEntry->PrefixLength < PrefixEntry->PrefixLength) { 254 break; 255 } 256 } 257 258 NetListInsertBefore (Entry, &PrefixEntry->Link); 259 260 return PrefixEntry; 261 } 262 263 /** 264 Destroy a IP6 prefix list entry. 265 266 @param[in] IpSb The pointer to IP6_SERVICE instance. 267 @param[in] PrefixEntry The to be destroyed prefix list entry. 268 @param[in] OnLinkOrAuto If TRUE, the entry is removed from on link prefix list. 269 Otherwise remove from autoconfiguration prefix list. 270 @param[in] ImmediateDelete If TRUE, remove the entry directly. 271 Otherwise, check the reference count to see whether 272 it should be removed. 273 274 **/ 275 VOID 276 Ip6DestroyPrefixListEntry ( 277 IN IP6_SERVICE *IpSb, 278 IN IP6_PREFIX_LIST_ENTRY *PrefixEntry, 279 IN BOOLEAN OnLinkOrAuto, 280 IN BOOLEAN ImmediateDelete 281 ) 282 { 283 LIST_ENTRY *Entry; 284 IP6_INTERFACE *IpIf; 285 EFI_STATUS Status; 286 287 if ((!ImmediateDelete) && (PrefixEntry->RefCnt > 0) && ((--PrefixEntry->RefCnt) > 0)) { 288 return ; 289 } 290 291 if (OnLinkOrAuto) { 292 // 293 // Remove the direct route for onlink prefix from route table. 294 // 295 do { 296 Status = Ip6DelRoute ( 297 IpSb->RouteTable, 298 &PrefixEntry->Prefix, 299 PrefixEntry->PrefixLength, 300 NULL 301 ); 302 } while (Status != EFI_NOT_FOUND); 303 } else { 304 // 305 // Remove the corresponding addresses generated from this autonomous prefix. 306 // 307 NET_LIST_FOR_EACH (Entry, &IpSb->Interfaces) { 308 IpIf = NET_LIST_USER_STRUCT_S (Entry, IP6_INTERFACE, Link, IP6_INTERFACE_SIGNATURE); 309 310 Ip6RemoveAddr (IpSb, &IpIf->AddressList, &IpIf->AddressCount, &PrefixEntry->Prefix, PrefixEntry->PrefixLength); 311 } 312 } 313 314 RemoveEntryList (&PrefixEntry->Link); 315 FreePool (PrefixEntry); 316 } 317 318 /** 319 Search the list array to find an IP6 prefix list entry. 320 321 @param[in] IpSb The pointer to IP6_SERVICE instance. 322 @param[in] OnLinkOrAuto If TRUE, the search the link prefix list, 323 Otherwise search the autoconfiguration prefix list. 324 @param[in] PrefixLength The prefix length of the Prefix 325 @param[in] Prefix The prefix address. 326 327 @return NULL if cannot find the IP6 prefix list entry. Otherwise, return the 328 pointer to the IP6 prefix list entry. 329 330 **/ 331 IP6_PREFIX_LIST_ENTRY * 332 Ip6FindPrefixListEntry ( 333 IN IP6_SERVICE *IpSb, 334 IN BOOLEAN OnLinkOrAuto, 335 IN UINT8 PrefixLength, 336 IN EFI_IPv6_ADDRESS *Prefix 337 ) 338 { 339 IP6_PREFIX_LIST_ENTRY *PrefixList; 340 LIST_ENTRY *Entry; 341 LIST_ENTRY *ListHead; 342 343 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 344 ASSERT (Prefix != NULL); 345 346 if (OnLinkOrAuto) { 347 ListHead = &IpSb->OnlinkPrefix; 348 } else { 349 ListHead = &IpSb->AutonomousPrefix; 350 } 351 352 NET_LIST_FOR_EACH (Entry, ListHead) { 353 PrefixList = NET_LIST_USER_STRUCT (Entry, IP6_PREFIX_LIST_ENTRY, Link); 354 if (PrefixLength != 255) { 355 // 356 // Perform exactly prefix match. 357 // 358 if (PrefixList->PrefixLength == PrefixLength && 359 NetIp6IsNetEqual (&PrefixList->Prefix, Prefix, PrefixLength)) { 360 return PrefixList; 361 } 362 } else { 363 // 364 // Perform the longest prefix match. The list is already sorted with 365 // the longest length prefix put at the head of the list. 366 // 367 if (NetIp6IsNetEqual (&PrefixList->Prefix, Prefix, PrefixList->PrefixLength)) { 368 return PrefixList; 369 } 370 } 371 } 372 373 return NULL; 374 } 375 376 /** 377 Release the resource in the prefix list table, and destroy the list entry and 378 corresponding addresses or route entries. 379 380 @param[in] IpSb The pointer to the IP6_SERVICE instance. 381 @param[in] ListHead The list entry head of the prefix list table. 382 383 **/ 384 VOID 385 Ip6CleanPrefixListTable ( 386 IN IP6_SERVICE *IpSb, 387 IN LIST_ENTRY *ListHead 388 ) 389 { 390 IP6_PREFIX_LIST_ENTRY *PrefixList; 391 BOOLEAN OnLink; 392 393 OnLink = (BOOLEAN) (ListHead == &IpSb->OnlinkPrefix); 394 395 while (!IsListEmpty (ListHead)) { 396 PrefixList = NET_LIST_HEAD (ListHead, IP6_PREFIX_LIST_ENTRY, Link); 397 Ip6DestroyPrefixListEntry (IpSb, PrefixList, OnLink, TRUE); 398 } 399 } 400 401 /** 402 Callback function when address resolution is finished. It will cancel 403 all the queued frames if the address resolution failed, or transmit them 404 if the request succeeded. 405 406 @param[in] Context The context of the callback, a pointer to IP6_NEIGHBOR_ENTRY. 407 408 **/ 409 VOID 410 Ip6OnArpResolved ( 411 IN VOID *Context 412 ) 413 { 414 LIST_ENTRY *Entry; 415 LIST_ENTRY *Next; 416 IP6_NEIGHBOR_ENTRY *ArpQue; 417 IP6_SERVICE *IpSb; 418 IP6_LINK_TX_TOKEN *Token; 419 EFI_STATUS Status; 420 BOOLEAN Sent; 421 422 ArpQue = (IP6_NEIGHBOR_ENTRY *) Context; 423 if ((ArpQue == NULL) || (ArpQue->Interface == NULL)) { 424 return ; 425 } 426 427 IpSb = ArpQue->Interface->Service; 428 if ((IpSb == NULL) || (IpSb->Signature != IP6_SERVICE_SIGNATURE)) { 429 return ; 430 } 431 432 // 433 // ARP resolve failed for some reason. Release all the frame 434 // and ARP queue itself. Ip6FreeArpQue will call the frame's 435 // owner back. 436 // 437 if (NET_MAC_EQUAL (&ArpQue->LinkAddress, &mZeroMacAddress, IpSb->SnpMode.HwAddressSize)) { 438 Ip6FreeNeighborEntry (IpSb, ArpQue, FALSE, TRUE, EFI_NO_MAPPING, NULL, NULL); 439 return ; 440 } 441 442 // 443 // ARP resolve succeeded, Transmit all the frame. 444 // 445 Sent = FALSE; 446 NET_LIST_FOR_EACH_SAFE (Entry, Next, &ArpQue->Frames) { 447 RemoveEntryList (Entry); 448 449 Token = NET_LIST_USER_STRUCT (Entry, IP6_LINK_TX_TOKEN, Link); 450 IP6_COPY_LINK_ADDRESS (&Token->DstMac, &ArpQue->LinkAddress); 451 452 // 453 // Insert the tx token before transmitting it via MNP as the FrameSentDpc 454 // may be called before Mnp->Transmit returns which will remove this tx 455 // token from the SentFrames list. Remove it from the list if the returned 456 // Status of Mnp->Transmit is not EFI_SUCCESS as in this case the 457 // FrameSentDpc won't be queued. 458 // 459 InsertTailList (&ArpQue->Interface->SentFrames, &Token->Link); 460 461 Status = IpSb->Mnp->Transmit (IpSb->Mnp, &Token->MnpToken); 462 if (EFI_ERROR (Status)) { 463 RemoveEntryList (&Token->Link); 464 Token->CallBack (Token->Packet, Status, 0, Token->Context); 465 466 Ip6FreeLinkTxToken (Token); 467 continue; 468 } else { 469 Sent = TRUE; 470 } 471 } 472 473 // 474 // Free the ArpQue only but not the whole neighbor entry. 475 // 476 Ip6FreeNeighborEntry (IpSb, ArpQue, FALSE, FALSE, EFI_SUCCESS, NULL, NULL); 477 478 if (Sent && (ArpQue->State == EfiNeighborStale)) { 479 ArpQue->State = EfiNeighborDelay; 480 ArpQue->Ticks = (UINT32) IP6_GET_TICKS (IP6_DELAY_FIRST_PROBE_TIME); 481 } 482 } 483 484 /** 485 Allocate and initialize an IP6 neighbor cache entry. 486 487 @param[in] IpSb The pointer to the IP6_SERVICE instance. 488 @param[in] CallBack The callback function to be called when 489 address resolution is finished. 490 @param[in] Ip6Address Points to the IPv6 address of the neighbor. 491 @param[in] LinkAddress Points to the MAC address of the neighbor. 492 Ignored if NULL. 493 494 @return NULL if failed to allocate memory for the neighbor cache entry. 495 Otherwise, point to the created neighbor cache entry. 496 497 **/ 498 IP6_NEIGHBOR_ENTRY * 499 Ip6CreateNeighborEntry ( 500 IN IP6_SERVICE *IpSb, 501 IN IP6_ARP_CALLBACK CallBack, 502 IN EFI_IPv6_ADDRESS *Ip6Address, 503 IN EFI_MAC_ADDRESS *LinkAddress OPTIONAL 504 ) 505 { 506 IP6_NEIGHBOR_ENTRY *Entry; 507 IP6_DEFAULT_ROUTER *DefaultRouter; 508 509 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 510 ASSERT (Ip6Address!= NULL); 511 512 Entry = AllocateZeroPool (sizeof (IP6_NEIGHBOR_ENTRY)); 513 if (Entry == NULL) { 514 return NULL; 515 } 516 517 Entry->RefCnt = 1; 518 Entry->IsRouter = FALSE; 519 Entry->ArpFree = FALSE; 520 Entry->Dynamic = FALSE; 521 Entry->State = EfiNeighborInComplete; 522 Entry->Transmit = IP6_MAX_MULTICAST_SOLICIT + 1; 523 Entry->CallBack = CallBack; 524 Entry->Interface = NULL; 525 526 InitializeListHead (&Entry->Frames); 527 528 IP6_COPY_ADDRESS (&Entry->Neighbor, Ip6Address); 529 530 if (LinkAddress != NULL) { 531 IP6_COPY_LINK_ADDRESS (&Entry->LinkAddress, LinkAddress); 532 } else { 533 IP6_COPY_LINK_ADDRESS (&Entry->LinkAddress, &mZeroMacAddress); 534 } 535 536 InsertHeadList (&IpSb->NeighborTable, &Entry->Link); 537 538 // 539 // If corresponding default router entry exists, establish the relationship. 540 // 541 DefaultRouter = Ip6FindDefaultRouter (IpSb, Ip6Address); 542 if (DefaultRouter != NULL) { 543 DefaultRouter->NeighborCache = Entry; 544 } 545 546 return Entry; 547 } 548 549 /** 550 Search a IP6 neighbor cache entry. 551 552 @param[in] IpSb The pointer to the IP6_SERVICE instance. 553 @param[in] Ip6Address Points to the IPv6 address of the neighbor. 554 555 @return NULL if it failed to find the matching neighbor cache entry. 556 Otherwise, point to the found neighbor cache entry. 557 558 **/ 559 IP6_NEIGHBOR_ENTRY * 560 Ip6FindNeighborEntry ( 561 IN IP6_SERVICE *IpSb, 562 IN EFI_IPv6_ADDRESS *Ip6Address 563 ) 564 { 565 LIST_ENTRY *Entry; 566 LIST_ENTRY *Next; 567 IP6_NEIGHBOR_ENTRY *Neighbor; 568 569 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 570 ASSERT (Ip6Address != NULL); 571 572 NET_LIST_FOR_EACH_SAFE (Entry, Next, &IpSb->NeighborTable) { 573 Neighbor = NET_LIST_USER_STRUCT (Entry, IP6_NEIGHBOR_ENTRY, Link); 574 if (EFI_IP6_EQUAL (Ip6Address, &Neighbor->Neighbor)) { 575 RemoveEntryList (Entry); 576 InsertHeadList (&IpSb->NeighborTable, Entry); 577 578 return Neighbor; 579 } 580 } 581 582 return NULL; 583 } 584 585 /** 586 Free a IP6 neighbor cache entry and remove all the frames on the address 587 resolution queue that pass the FrameToCancel. That is, either FrameToCancel 588 is NULL, or it returns true for the frame. 589 590 @param[in] IpSb The pointer to the IP6_SERVICE instance. 591 @param[in] NeighborCache The to be free neighbor cache entry. 592 @param[in] SendIcmpError If TRUE, send out ICMP error. 593 @param[in] FullFree If TRUE, remove the neighbor cache entry. 594 Otherwise remove the pending frames. 595 @param[in] IoStatus The status returned to the cancelled frames' 596 callback function. 597 @param[in] FrameToCancel Function to select which frame to cancel. 598 This is an optional parameter that may be NULL. 599 @param[in] Context Opaque parameter to the FrameToCancel. 600 Ignored if FrameToCancel is NULL. 601 602 @retval EFI_INVALID_PARAMETER The input parameter is invalid. 603 @retval EFI_SUCCESS The operation finished successfully. 604 605 **/ 606 EFI_STATUS 607 Ip6FreeNeighborEntry ( 608 IN IP6_SERVICE *IpSb, 609 IN IP6_NEIGHBOR_ENTRY *NeighborCache, 610 IN BOOLEAN SendIcmpError, 611 IN BOOLEAN FullFree, 612 IN EFI_STATUS IoStatus, 613 IN IP6_FRAME_TO_CANCEL FrameToCancel OPTIONAL, 614 IN VOID *Context OPTIONAL 615 ) 616 { 617 IP6_LINK_TX_TOKEN *TxToken; 618 LIST_ENTRY *Entry; 619 LIST_ENTRY *Next; 620 IP6_DEFAULT_ROUTER *DefaultRouter; 621 622 // 623 // If FrameToCancel fails, the token will not be released. 624 // To avoid the memory leak, stop this usage model. 625 // 626 if (FullFree && FrameToCancel != NULL) { 627 return EFI_INVALID_PARAMETER; 628 } 629 630 NET_LIST_FOR_EACH_SAFE (Entry, Next, &NeighborCache->Frames) { 631 TxToken = NET_LIST_USER_STRUCT (Entry, IP6_LINK_TX_TOKEN, Link); 632 633 if (SendIcmpError && !IP6_IS_MULTICAST (&TxToken->Packet->Ip.Ip6->DestinationAddress)) { 634 Ip6SendIcmpError ( 635 IpSb, 636 TxToken->Packet, 637 NULL, 638 &TxToken->Packet->Ip.Ip6->SourceAddress, 639 ICMP_V6_DEST_UNREACHABLE, 640 ICMP_V6_ADDR_UNREACHABLE, 641 NULL 642 ); 643 } 644 645 if ((FrameToCancel == NULL) || FrameToCancel (TxToken, Context)) { 646 RemoveEntryList (Entry); 647 TxToken->CallBack (TxToken->Packet, IoStatus, 0, TxToken->Context); 648 Ip6FreeLinkTxToken (TxToken); 649 } 650 } 651 652 if (NeighborCache->ArpFree && IsListEmpty (&NeighborCache->Frames)) { 653 RemoveEntryList (&NeighborCache->ArpList); 654 NeighborCache->ArpFree = FALSE; 655 } 656 657 if (FullFree) { 658 if (NeighborCache->IsRouter) { 659 DefaultRouter = Ip6FindDefaultRouter (IpSb, &NeighborCache->Neighbor); 660 if (DefaultRouter != NULL) { 661 Ip6DestroyDefaultRouter (IpSb, DefaultRouter); 662 } 663 } 664 665 RemoveEntryList (&NeighborCache->Link); 666 FreePool (NeighborCache); 667 } 668 669 return EFI_SUCCESS; 670 } 671 672 /** 673 Allocate and initialize an IP6 default router entry. 674 675 @param[in] IpSb The pointer to the IP6_SERVICE instance. 676 @param[in] Ip6Address The IPv6 address of the default router. 677 @param[in] RouterLifetime The lifetime associated with the default 678 router, in units of seconds. 679 680 @return NULL if it failed to allocate memory for the default router node. 681 Otherwise, point to the created default router node. 682 683 **/ 684 IP6_DEFAULT_ROUTER * 685 Ip6CreateDefaultRouter ( 686 IN IP6_SERVICE *IpSb, 687 IN EFI_IPv6_ADDRESS *Ip6Address, 688 IN UINT16 RouterLifetime 689 ) 690 { 691 IP6_DEFAULT_ROUTER *Entry; 692 IP6_ROUTE_ENTRY *RtEntry; 693 694 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 695 ASSERT (Ip6Address != NULL); 696 697 Entry = AllocatePool (sizeof (IP6_DEFAULT_ROUTER)); 698 if (Entry == NULL) { 699 return NULL; 700 } 701 702 Entry->RefCnt = 1; 703 Entry->Lifetime = RouterLifetime; 704 Entry->NeighborCache = Ip6FindNeighborEntry (IpSb, Ip6Address); 705 IP6_COPY_ADDRESS (&Entry->Router, Ip6Address); 706 707 // 708 // Add a default route into route table with both Destination and PrefixLength set to zero. 709 // 710 RtEntry = Ip6CreateRouteEntry (NULL, 0, Ip6Address); 711 if (RtEntry == NULL) { 712 FreePool (Entry); 713 return NULL; 714 } 715 716 InsertHeadList (&IpSb->RouteTable->RouteArea[0], &RtEntry->Link); 717 IpSb->RouteTable->TotalNum++; 718 719 InsertTailList (&IpSb->DefaultRouterList, &Entry->Link); 720 721 return Entry; 722 } 723 724 /** 725 Destroy an IP6 default router entry. 726 727 @param[in] IpSb The pointer to the IP6_SERVICE instance. 728 @param[in] DefaultRouter The to be destroyed IP6_DEFAULT_ROUTER. 729 730 **/ 731 VOID 732 Ip6DestroyDefaultRouter ( 733 IN IP6_SERVICE *IpSb, 734 IN IP6_DEFAULT_ROUTER *DefaultRouter 735 ) 736 { 737 EFI_STATUS Status; 738 739 RemoveEntryList (&DefaultRouter->Link); 740 741 // 742 // Update the Destination Cache - all entries using the time-out router as next-hop 743 // should perform next-hop determination again. 744 // 745 do { 746 Status = Ip6DelRoute (IpSb->RouteTable, NULL, 0, &DefaultRouter->Router); 747 } while (Status != EFI_NOT_FOUND); 748 749 FreePool (DefaultRouter); 750 } 751 752 /** 753 Clean an IP6 default router list. 754 755 @param[in] IpSb The pointer to the IP6_SERVICE instance. 756 757 **/ 758 VOID 759 Ip6CleanDefaultRouterList ( 760 IN IP6_SERVICE *IpSb 761 ) 762 { 763 IP6_DEFAULT_ROUTER *DefaultRouter; 764 765 while (!IsListEmpty (&IpSb->DefaultRouterList)) { 766 DefaultRouter = NET_LIST_HEAD (&IpSb->DefaultRouterList, IP6_DEFAULT_ROUTER, Link); 767 Ip6DestroyDefaultRouter (IpSb, DefaultRouter); 768 } 769 } 770 771 /** 772 Search a default router node from an IP6 default router list. 773 774 @param[in] IpSb The pointer to the IP6_SERVICE instance. 775 @param[in] Ip6Address The IPv6 address of the to be searched default router node. 776 777 @return NULL if it failed to find the matching default router node. 778 Otherwise, point to the found default router node. 779 780 **/ 781 IP6_DEFAULT_ROUTER * 782 Ip6FindDefaultRouter ( 783 IN IP6_SERVICE *IpSb, 784 IN EFI_IPv6_ADDRESS *Ip6Address 785 ) 786 { 787 LIST_ENTRY *Entry; 788 IP6_DEFAULT_ROUTER *DefaultRouter; 789 790 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 791 ASSERT (Ip6Address != NULL); 792 793 NET_LIST_FOR_EACH (Entry, &IpSb->DefaultRouterList) { 794 DefaultRouter = NET_LIST_USER_STRUCT (Entry, IP6_DEFAULT_ROUTER, Link); 795 if (EFI_IP6_EQUAL (Ip6Address, &DefaultRouter->Router)) { 796 return DefaultRouter; 797 } 798 } 799 800 return NULL; 801 } 802 803 /** 804 The function to be called after DAD (Duplicate Address Detection) is performed. 805 806 @param[in] IsDadPassed If TRUE, the DAD operation succeed. Otherwise, the DAD operation failed. 807 @param[in] IpIf Points to the IP6_INTERFACE. 808 @param[in] DadEntry The DAD entry which already performed DAD. 809 810 **/ 811 VOID 812 Ip6OnDADFinished ( 813 IN BOOLEAN IsDadPassed, 814 IN IP6_INTERFACE *IpIf, 815 IN IP6_DAD_ENTRY *DadEntry 816 ) 817 { 818 IP6_SERVICE *IpSb; 819 IP6_ADDRESS_INFO *AddrInfo; 820 EFI_DHCP6_PROTOCOL *Dhcp6; 821 UINT16 OptBuf[4]; 822 EFI_DHCP6_PACKET_OPTION *Oro; 823 EFI_DHCP6_RETRANSMISSION InfoReqReXmit; 824 EFI_IPv6_ADDRESS AllNodes; 825 826 IpSb = IpIf->Service; 827 AddrInfo = DadEntry->AddressInfo; 828 829 if (IsDadPassed) { 830 // 831 // DAD succeed. 832 // 833 if (NetIp6IsLinkLocalAddr (&AddrInfo->Address)) { 834 ASSERT (!IpSb->LinkLocalOk); 835 836 IP6_COPY_ADDRESS (&IpSb->LinkLocalAddr, &AddrInfo->Address); 837 IpSb->LinkLocalOk = TRUE; 838 IpIf->Configured = TRUE; 839 840 // 841 // Check whether DHCP6 need to be started. 842 // 843 Dhcp6 = IpSb->Ip6ConfigInstance.Dhcp6; 844 845 if (IpSb->Dhcp6NeedStart) { 846 Dhcp6->Start (Dhcp6); 847 IpSb->Dhcp6NeedStart = FALSE; 848 } 849 850 if (IpSb->Dhcp6NeedInfoRequest) { 851 // 852 // Set the exta options to send. Here we only want the option request option 853 // with DNS SERVERS. 854 // 855 Oro = (EFI_DHCP6_PACKET_OPTION *) OptBuf; 856 Oro->OpCode = HTONS (IP6_CONFIG_DHCP6_OPTION_ORO); 857 Oro->OpLen = HTONS (2); 858 *((UINT16 *) &Oro->Data[0]) = HTONS (IP6_CONFIG_DHCP6_OPTION_DNS_SERVERS); 859 860 InfoReqReXmit.Irt = 4; 861 InfoReqReXmit.Mrc = 64; 862 InfoReqReXmit.Mrt = 60; 863 InfoReqReXmit.Mrd = 0; 864 865 Dhcp6->InfoRequest ( 866 Dhcp6, 867 TRUE, 868 Oro, 869 0, 870 NULL, 871 &InfoReqReXmit, 872 IpSb->Ip6ConfigInstance.Dhcp6Event, 873 Ip6ConfigOnDhcp6Reply, 874 &IpSb->Ip6ConfigInstance 875 ); 876 } 877 878 // 879 // Add an on-link prefix for link-local address. 880 // 881 Ip6CreatePrefixListEntry ( 882 IpSb, 883 TRUE, 884 (UINT32) IP6_INFINIT_LIFETIME, 885 (UINT32) IP6_INFINIT_LIFETIME, 886 IP6_LINK_LOCAL_PREFIX_LENGTH, 887 &IpSb->LinkLocalAddr 888 ); 889 890 } else { 891 // 892 // Global scope unicast address. 893 // 894 Ip6AddAddr (IpIf, AddrInfo); 895 896 // 897 // Add an on-link prefix for this address. 898 // 899 Ip6CreatePrefixListEntry ( 900 IpSb, 901 TRUE, 902 AddrInfo->ValidLifetime, 903 AddrInfo->PreferredLifetime, 904 AddrInfo->PrefixLength, 905 &AddrInfo->Address 906 ); 907 908 IpIf->Configured = TRUE; 909 } 910 } else { 911 // 912 // Leave the group we joined before. 913 // 914 Ip6LeaveGroup (IpSb, &DadEntry->Destination); 915 } 916 917 if (DadEntry->Callback != NULL) { 918 DadEntry->Callback (IsDadPassed, &AddrInfo->Address, DadEntry->Context); 919 } 920 921 if (!IsDadPassed && NetIp6IsLinkLocalAddr (&AddrInfo->Address)) { 922 FreePool (AddrInfo); 923 RemoveEntryList (&DadEntry->Link); 924 FreePool (DadEntry); 925 // 926 // Leave link-scope all-nodes multicast address (FF02::1) 927 // 928 Ip6SetToAllNodeMulticast (FALSE, IP6_LINK_LOCAL_SCOPE, &AllNodes); 929 Ip6LeaveGroup (IpSb, &AllNodes); 930 // 931 // Disable IP operation since link-local address is a duplicate address. 932 // 933 IpSb->LinkLocalDadFail = TRUE; 934 IpSb->Mnp->Configure (IpSb->Mnp, NULL); 935 gBS->SetTimer (IpSb->Timer, TimerCancel, 0); 936 gBS->SetTimer (IpSb->FasterTimer, TimerCancel, 0); 937 return ; 938 } 939 940 if (!IsDadPassed || NetIp6IsLinkLocalAddr (&AddrInfo->Address)) { 941 // 942 // Free the AddressInfo we hold if DAD fails or it is a link-local address. 943 // 944 FreePool (AddrInfo); 945 } 946 947 RemoveEntryList (&DadEntry->Link); 948 FreePool (DadEntry); 949 } 950 951 /** 952 Create a DAD (Duplicate Address Detection) entry and queue it to be performed. 953 954 @param[in] IpIf Points to the IP6_INTERFACE. 955 @param[in] AddressInfo The address information which needs DAD performed. 956 @param[in] Callback The callback routine that will be called after DAD 957 is performed. This is an optional parameter that 958 may be NULL. 959 @param[in] Context The opaque parameter for a DAD callback routine. 960 This is an optional parameter that may be NULL. 961 962 @retval EFI_SUCCESS The DAD entry was created and queued. 963 @retval EFI_OUT_OF_RESOURCES Failed to allocate the memory to complete the 964 operation. 965 966 967 **/ 968 EFI_STATUS 969 Ip6InitDADProcess ( 970 IN IP6_INTERFACE *IpIf, 971 IN IP6_ADDRESS_INFO *AddressInfo, 972 IN IP6_DAD_CALLBACK Callback OPTIONAL, 973 IN VOID *Context OPTIONAL 974 ) 975 { 976 IP6_DAD_ENTRY *Entry; 977 EFI_IP6_CONFIG_DUP_ADDR_DETECT_TRANSMITS *DadXmits; 978 IP6_SERVICE *IpSb; 979 EFI_STATUS Status; 980 UINT32 MaxDelayTick; 981 982 NET_CHECK_SIGNATURE (IpIf, IP6_INTERFACE_SIGNATURE); 983 ASSERT (AddressInfo != NULL); 984 985 // 986 // Do nothing if we have already started DAD on the address. 987 // 988 if (Ip6FindDADEntry (IpIf->Service, &AddressInfo->Address, NULL) != NULL) { 989 return EFI_SUCCESS; 990 } 991 992 Status = EFI_SUCCESS; 993 IpSb = IpIf->Service; 994 DadXmits = &IpSb->Ip6ConfigInstance.DadXmits; 995 996 // 997 // Allocate the resources and insert info 998 // 999 Entry = AllocatePool (sizeof (IP6_DAD_ENTRY)); 1000 if (Entry == NULL) { 1001 return EFI_OUT_OF_RESOURCES; 1002 } 1003 1004 // 1005 // Map the incoming unicast address to solicited-node multicast address 1006 // 1007 Ip6CreateSNMulticastAddr (&AddressInfo->Address, &Entry->Destination); 1008 1009 // 1010 // Join in the solicited-node multicast address. 1011 // 1012 Status = Ip6JoinGroup (IpSb, IpIf, &Entry->Destination); 1013 if (EFI_ERROR (Status)) { 1014 FreePool (Entry); 1015 return Status; 1016 } 1017 1018 Entry->Signature = IP6_DAD_ENTRY_SIGNATURE; 1019 Entry->MaxTransmit = DadXmits->DupAddrDetectTransmits; 1020 Entry->Transmit = 0; 1021 Entry->Receive = 0; 1022 MaxDelayTick = IP6_MAX_RTR_SOLICITATION_DELAY / IP6_TIMER_INTERVAL_IN_MS; 1023 Entry->RetransTick = (MaxDelayTick * ((NET_RANDOM (NetRandomInitSeed ()) % 5) + 1)) / 5; 1024 Entry->AddressInfo = AddressInfo; 1025 Entry->Callback = Callback; 1026 Entry->Context = Context; 1027 InsertTailList (&IpIf->DupAddrDetectList, &Entry->Link); 1028 1029 if (Entry->MaxTransmit == 0) { 1030 // 1031 // DAD is disabled on this interface, immediately mark this DAD successful. 1032 // 1033 Ip6OnDADFinished (TRUE, IpIf, Entry); 1034 } 1035 1036 return EFI_SUCCESS; 1037 } 1038 1039 /** 1040 Search IP6_DAD_ENTRY from the Duplicate Address Detection List. 1041 1042 @param[in] IpSb The pointer to the IP6_SERVICE instance. 1043 @param[in] Target The address information which needs DAD performed . 1044 @param[out] Interface If not NULL, output the IP6 interface that configures 1045 the tentative address. 1046 1047 @return NULL if failed to find the matching DAD entry. 1048 Otherwise, point to the found DAD entry. 1049 1050 **/ 1051 IP6_DAD_ENTRY * 1052 Ip6FindDADEntry ( 1053 IN IP6_SERVICE *IpSb, 1054 IN EFI_IPv6_ADDRESS *Target, 1055 OUT IP6_INTERFACE **Interface OPTIONAL 1056 ) 1057 { 1058 LIST_ENTRY *Entry; 1059 LIST_ENTRY *Entry2; 1060 IP6_INTERFACE *IpIf; 1061 IP6_DAD_ENTRY *DupAddrDetect; 1062 IP6_ADDRESS_INFO *AddrInfo; 1063 1064 NET_LIST_FOR_EACH (Entry, &IpSb->Interfaces) { 1065 IpIf = NET_LIST_USER_STRUCT (Entry, IP6_INTERFACE, Link); 1066 1067 NET_LIST_FOR_EACH (Entry2, &IpIf->DupAddrDetectList) { 1068 DupAddrDetect = NET_LIST_USER_STRUCT_S (Entry2, IP6_DAD_ENTRY, Link, IP6_DAD_ENTRY_SIGNATURE); 1069 AddrInfo = DupAddrDetect->AddressInfo; 1070 if (EFI_IP6_EQUAL (&AddrInfo->Address, Target)) { 1071 if (Interface != NULL) { 1072 *Interface = IpIf; 1073 } 1074 return DupAddrDetect; 1075 } 1076 } 1077 } 1078 1079 return NULL; 1080 } 1081 1082 /** 1083 Generate router solicit message and send it out to Destination Address or 1084 All Router Link Local scope multicast address. 1085 1086 @param[in] IpSb The IP service to send the packet. 1087 @param[in] Interface If not NULL, points to the IP6 interface to send 1088 the packet. 1089 @param[in] SourceAddress If not NULL, the source address of the message. 1090 @param[in] DestinationAddress If not NULL, the destination address of the message. 1091 @param[in] SourceLinkAddress If not NULL, the MAC address of the source. 1092 A source link-layer address option will be appended 1093 to the message. 1094 1095 @retval EFI_OUT_OF_RESOURCES Insufficient resources to complete the 1096 operation. 1097 @retval EFI_SUCCESS The router solicit message was successfully sent. 1098 1099 **/ 1100 EFI_STATUS 1101 Ip6SendRouterSolicit ( 1102 IN IP6_SERVICE *IpSb, 1103 IN IP6_INTERFACE *Interface OPTIONAL, 1104 IN EFI_IPv6_ADDRESS *SourceAddress OPTIONAL, 1105 IN EFI_IPv6_ADDRESS *DestinationAddress OPTIONAL, 1106 IN EFI_MAC_ADDRESS *SourceLinkAddress OPTIONAL 1107 ) 1108 { 1109 NET_BUF *Packet; 1110 EFI_IP6_HEADER Head; 1111 IP6_ICMP_INFORMATION_HEAD *IcmpHead; 1112 IP6_ETHER_ADDR_OPTION *LinkLayerOption; 1113 UINT16 PayloadLen; 1114 IP6_INTERFACE *IpIf; 1115 1116 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 1117 1118 IpIf = Interface; 1119 if (IpIf == NULL && IpSb->DefaultInterface != NULL) { 1120 IpIf = IpSb->DefaultInterface; 1121 } 1122 1123 // 1124 // Generate the packet to be sent 1125 // 1126 1127 PayloadLen = (UINT16) sizeof (IP6_ICMP_INFORMATION_HEAD); 1128 if (SourceLinkAddress != NULL) { 1129 PayloadLen += sizeof (IP6_ETHER_ADDR_OPTION); 1130 } 1131 1132 Packet = NetbufAlloc (sizeof (EFI_IP6_HEADER) + (UINT32) PayloadLen); 1133 if (Packet == NULL) { 1134 return EFI_OUT_OF_RESOURCES; 1135 } 1136 1137 // 1138 // Create the basic IPv6 header. 1139 // 1140 Head.FlowLabelL = 0; 1141 Head.FlowLabelH = 0; 1142 Head.PayloadLength = HTONS (PayloadLen); 1143 Head.NextHeader = IP6_ICMP; 1144 Head.HopLimit = IP6_HOP_LIMIT; 1145 1146 if (SourceAddress != NULL) { 1147 IP6_COPY_ADDRESS (&Head.SourceAddress, SourceAddress); 1148 } else { 1149 ZeroMem (&Head.SourceAddress, sizeof (EFI_IPv6_ADDRESS)); 1150 } 1151 1152 1153 if (DestinationAddress != NULL) { 1154 IP6_COPY_ADDRESS (&Head.DestinationAddress, DestinationAddress); 1155 } else { 1156 Ip6SetToAllNodeMulticast (TRUE, IP6_LINK_LOCAL_SCOPE, &Head.DestinationAddress); 1157 } 1158 1159 NetbufReserve (Packet, sizeof (EFI_IP6_HEADER)); 1160 1161 // 1162 // Fill in the ICMP header, and Source link-layer address if contained. 1163 // 1164 1165 IcmpHead = (IP6_ICMP_INFORMATION_HEAD *) NetbufAllocSpace (Packet, sizeof (IP6_ICMP_INFORMATION_HEAD), FALSE); 1166 ASSERT (IcmpHead != NULL); 1167 ZeroMem (IcmpHead, sizeof (IP6_ICMP_INFORMATION_HEAD)); 1168 IcmpHead->Head.Type = ICMP_V6_ROUTER_SOLICIT; 1169 IcmpHead->Head.Code = 0; 1170 1171 LinkLayerOption = NULL; 1172 if (SourceLinkAddress != NULL) { 1173 LinkLayerOption = (IP6_ETHER_ADDR_OPTION *) NetbufAllocSpace ( 1174 Packet, 1175 sizeof (IP6_ETHER_ADDR_OPTION), 1176 FALSE 1177 ); 1178 ASSERT (LinkLayerOption != NULL); 1179 LinkLayerOption->Type = Ip6OptionEtherSource; 1180 LinkLayerOption->Length = (UINT8) sizeof (IP6_ETHER_ADDR_OPTION); 1181 CopyMem (LinkLayerOption->EtherAddr, SourceLinkAddress, 6); 1182 } 1183 1184 // 1185 // Transmit the packet 1186 // 1187 return Ip6Output (IpSb, IpIf, NULL, Packet, &Head, NULL, 0, Ip6SysPacketSent, NULL); 1188 } 1189 1190 /** 1191 Generate a Neighbor Advertisement message and send it out to Destination Address. 1192 1193 @param[in] IpSb The IP service to send the packet. 1194 @param[in] SourceAddress The source address of the message. 1195 @param[in] DestinationAddress The destination address of the message. 1196 @param[in] TargetIp6Address The target address field in the Neighbor Solicitation 1197 message that prompted this advertisement. 1198 @param[in] TargetLinkAddress The MAC address for the target, i.e. the sender 1199 of the advertisement. 1200 @param[in] IsRouter If TRUE, indicates the sender is a router. 1201 @param[in] Override If TRUE, indicates the advertisement should override 1202 an existing cache entry and update the MAC address. 1203 @param[in] Solicited If TRUE, indicates the advertisement was sent 1204 in response to a Neighbor Solicitation from 1205 the Destination address. 1206 1207 @retval EFI_OUT_OF_RESOURCES Insufficient resources to complete the 1208 operation. 1209 @retval EFI_SUCCESS The Neighbor Advertise message was successfully sent. 1210 1211 **/ 1212 EFI_STATUS 1213 Ip6SendNeighborAdvertise ( 1214 IN IP6_SERVICE *IpSb, 1215 IN EFI_IPv6_ADDRESS *SourceAddress, 1216 IN EFI_IPv6_ADDRESS *DestinationAddress, 1217 IN EFI_IPv6_ADDRESS *TargetIp6Address, 1218 IN EFI_MAC_ADDRESS *TargetLinkAddress, 1219 IN BOOLEAN IsRouter, 1220 IN BOOLEAN Override, 1221 IN BOOLEAN Solicited 1222 ) 1223 { 1224 NET_BUF *Packet; 1225 EFI_IP6_HEADER Head; 1226 IP6_ICMP_INFORMATION_HEAD *IcmpHead; 1227 IP6_ETHER_ADDR_OPTION *LinkLayerOption; 1228 EFI_IPv6_ADDRESS *Target; 1229 UINT16 PayloadLen; 1230 1231 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 1232 1233 // 1234 // The Neighbor Advertisement message must include a Target link-layer address option 1235 // when responding to multicast solicitation and should include such option when 1236 // responding to unicast solicitation. It also must include such option as unsolicited 1237 // advertisement. 1238 // 1239 ASSERT (DestinationAddress != NULL && TargetIp6Address != NULL && TargetLinkAddress != NULL); 1240 1241 PayloadLen = (UINT16) (sizeof (IP6_ICMP_INFORMATION_HEAD) + sizeof (EFI_IPv6_ADDRESS) + sizeof (IP6_ETHER_ADDR_OPTION)); 1242 1243 // 1244 // Generate the packet to be sent 1245 // 1246 1247 Packet = NetbufAlloc (sizeof (EFI_IP6_HEADER) + (UINT32) PayloadLen); 1248 if (Packet == NULL) { 1249 return EFI_OUT_OF_RESOURCES; 1250 } 1251 1252 // 1253 // Create the basic IPv6 header. 1254 // 1255 Head.FlowLabelL = 0; 1256 Head.FlowLabelH = 0; 1257 Head.PayloadLength = HTONS (PayloadLen); 1258 Head.NextHeader = IP6_ICMP; 1259 Head.HopLimit = IP6_HOP_LIMIT; 1260 1261 IP6_COPY_ADDRESS (&Head.SourceAddress, SourceAddress); 1262 IP6_COPY_ADDRESS (&Head.DestinationAddress, DestinationAddress); 1263 1264 NetbufReserve (Packet, sizeof (EFI_IP6_HEADER)); 1265 1266 // 1267 // Fill in the ICMP header, Target address, and Target link-layer address. 1268 // Set the Router flag, Solicited flag and Override flag. 1269 // 1270 1271 IcmpHead = (IP6_ICMP_INFORMATION_HEAD *) NetbufAllocSpace (Packet, sizeof (IP6_ICMP_INFORMATION_HEAD), FALSE); 1272 ASSERT (IcmpHead != NULL); 1273 ZeroMem (IcmpHead, sizeof (IP6_ICMP_INFORMATION_HEAD)); 1274 IcmpHead->Head.Type = ICMP_V6_NEIGHBOR_ADVERTISE; 1275 IcmpHead->Head.Code = 0; 1276 1277 if (IsRouter) { 1278 IcmpHead->Fourth |= IP6_IS_ROUTER_FLAG; 1279 } 1280 1281 if (Solicited) { 1282 IcmpHead->Fourth |= IP6_SOLICITED_FLAG; 1283 } 1284 1285 if (Override) { 1286 IcmpHead->Fourth |= IP6_OVERRIDE_FLAG; 1287 } 1288 1289 Target = (EFI_IPv6_ADDRESS *) NetbufAllocSpace (Packet, sizeof (EFI_IPv6_ADDRESS), FALSE); 1290 ASSERT (Target != NULL); 1291 IP6_COPY_ADDRESS (Target, TargetIp6Address); 1292 1293 LinkLayerOption = (IP6_ETHER_ADDR_OPTION *) NetbufAllocSpace ( 1294 Packet, 1295 sizeof (IP6_ETHER_ADDR_OPTION), 1296 FALSE 1297 ); 1298 ASSERT (LinkLayerOption != NULL); 1299 LinkLayerOption->Type = Ip6OptionEtherTarget; 1300 LinkLayerOption->Length = 1; 1301 CopyMem (LinkLayerOption->EtherAddr, TargetLinkAddress, 6); 1302 1303 // 1304 // Transmit the packet 1305 // 1306 return Ip6Output (IpSb, NULL, NULL, Packet, &Head, NULL, 0, Ip6SysPacketSent, NULL); 1307 } 1308 1309 /** 1310 Generate the Neighbor Solicitation message and send it to the Destination Address. 1311 1312 @param[in] IpSb The IP service to send the packet 1313 @param[in] SourceAddress The source address of the message. 1314 @param[in] DestinationAddress The destination address of the message. 1315 @param[in] TargetIp6Address The IP address of the target of the solicitation. 1316 It must not be a multicast address. 1317 @param[in] SourceLinkAddress The MAC address for the sender. If not NULL, 1318 a source link-layer address option will be appended 1319 to the message. 1320 1321 @retval EFI_INVALID_PARAMETER Any input parameter is invalid. 1322 @retval EFI_OUT_OF_RESOURCES Insufficient resources to complete the 1323 operation. 1324 @retval EFI_SUCCESS The Neighbor Advertise message was successfully sent. 1325 1326 **/ 1327 EFI_STATUS 1328 Ip6SendNeighborSolicit ( 1329 IN IP6_SERVICE *IpSb, 1330 IN EFI_IPv6_ADDRESS *SourceAddress, 1331 IN EFI_IPv6_ADDRESS *DestinationAddress, 1332 IN EFI_IPv6_ADDRESS *TargetIp6Address, 1333 IN EFI_MAC_ADDRESS *SourceLinkAddress OPTIONAL 1334 ) 1335 { 1336 NET_BUF *Packet; 1337 EFI_IP6_HEADER Head; 1338 IP6_ICMP_INFORMATION_HEAD *IcmpHead; 1339 IP6_ETHER_ADDR_OPTION *LinkLayerOption; 1340 EFI_IPv6_ADDRESS *Target; 1341 BOOLEAN IsDAD; 1342 UINT16 PayloadLen; 1343 IP6_NEIGHBOR_ENTRY *Neighbor; 1344 1345 // 1346 // Check input parameters 1347 // 1348 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 1349 if (DestinationAddress == NULL || TargetIp6Address == NULL) { 1350 return EFI_INVALID_PARAMETER; 1351 } 1352 1353 IsDAD = FALSE; 1354 1355 if (SourceAddress == NULL || (SourceAddress != NULL && NetIp6IsUnspecifiedAddr (SourceAddress))) { 1356 IsDAD = TRUE; 1357 } 1358 1359 // 1360 // The Neighbor Solicitation message should include a source link-layer address option 1361 // if the solicitation is not sent by performing DAD - Duplicate Address Detection. 1362 // Otherwise must not include it. 1363 // 1364 PayloadLen = (UINT16) (sizeof (IP6_ICMP_INFORMATION_HEAD) + sizeof (EFI_IPv6_ADDRESS)); 1365 1366 if (!IsDAD) { 1367 if (SourceLinkAddress == NULL) { 1368 return EFI_INVALID_PARAMETER; 1369 } 1370 1371 PayloadLen = (UINT16) (PayloadLen + sizeof (IP6_ETHER_ADDR_OPTION)); 1372 } 1373 1374 // 1375 // Generate the packet to be sent 1376 // 1377 1378 Packet = NetbufAlloc (sizeof (EFI_IP6_HEADER) + (UINT32) PayloadLen); 1379 if (Packet == NULL) { 1380 return EFI_OUT_OF_RESOURCES; 1381 } 1382 1383 // 1384 // Create the basic IPv6 header 1385 // 1386 Head.FlowLabelL = 0; 1387 Head.FlowLabelH = 0; 1388 Head.PayloadLength = HTONS (PayloadLen); 1389 Head.NextHeader = IP6_ICMP; 1390 Head.HopLimit = IP6_HOP_LIMIT; 1391 1392 if (SourceAddress != NULL) { 1393 IP6_COPY_ADDRESS (&Head.SourceAddress, SourceAddress); 1394 } else { 1395 ZeroMem (&Head.SourceAddress, sizeof (EFI_IPv6_ADDRESS)); 1396 } 1397 1398 IP6_COPY_ADDRESS (&Head.DestinationAddress, DestinationAddress); 1399 1400 NetbufReserve (Packet, sizeof (EFI_IP6_HEADER)); 1401 1402 // 1403 // Fill in the ICMP header, Target address, and Source link-layer address. 1404 // 1405 IcmpHead = (IP6_ICMP_INFORMATION_HEAD *) NetbufAllocSpace (Packet, sizeof (IP6_ICMP_INFORMATION_HEAD), FALSE); 1406 ASSERT (IcmpHead != NULL); 1407 ZeroMem (IcmpHead, sizeof (IP6_ICMP_INFORMATION_HEAD)); 1408 IcmpHead->Head.Type = ICMP_V6_NEIGHBOR_SOLICIT; 1409 IcmpHead->Head.Code = 0; 1410 1411 Target = (EFI_IPv6_ADDRESS *) NetbufAllocSpace (Packet, sizeof (EFI_IPv6_ADDRESS), FALSE); 1412 ASSERT (Target != NULL); 1413 IP6_COPY_ADDRESS (Target, TargetIp6Address); 1414 1415 LinkLayerOption = NULL; 1416 if (!IsDAD) { 1417 1418 // 1419 // Fill in the source link-layer address option 1420 // 1421 LinkLayerOption = (IP6_ETHER_ADDR_OPTION *) NetbufAllocSpace ( 1422 Packet, 1423 sizeof (IP6_ETHER_ADDR_OPTION), 1424 FALSE 1425 ); 1426 ASSERT (LinkLayerOption != NULL); 1427 LinkLayerOption->Type = Ip6OptionEtherSource; 1428 LinkLayerOption->Length = 1; 1429 CopyMem (LinkLayerOption->EtherAddr, SourceLinkAddress, 6); 1430 } 1431 1432 // 1433 // Create a Neighbor Cache entry in the INCOMPLETE state when performing 1434 // address resolution. 1435 // 1436 if (!IsDAD && Ip6IsSNMulticastAddr (DestinationAddress)) { 1437 Neighbor = Ip6FindNeighborEntry (IpSb, TargetIp6Address); 1438 if (Neighbor == NULL) { 1439 Neighbor = Ip6CreateNeighborEntry (IpSb, Ip6OnArpResolved, TargetIp6Address, NULL); 1440 ASSERT (Neighbor != NULL); 1441 } 1442 } 1443 1444 // 1445 // Transmit the packet 1446 // 1447 return Ip6Output (IpSb, IpSb->DefaultInterface, NULL, Packet, &Head, NULL, 0, Ip6SysPacketSent, NULL); 1448 } 1449 1450 /** 1451 Process the Neighbor Solicitation message. The message may be sent for Duplicate 1452 Address Detection or Address Resolution. 1453 1454 @param[in] IpSb The IP service that received the packet. 1455 @param[in] Head The IP head of the message. 1456 @param[in] Packet The content of the message with IP head removed. 1457 1458 @retval EFI_SUCCESS The packet processed successfully. 1459 @retval EFI_INVALID_PARAMETER The packet is invalid. 1460 @retval EFI_ICMP_ERROR The packet indicates that DAD is failed. 1461 @retval Others Failed to process the packet. 1462 1463 **/ 1464 EFI_STATUS 1465 Ip6ProcessNeighborSolicit ( 1466 IN IP6_SERVICE *IpSb, 1467 IN EFI_IP6_HEADER *Head, 1468 IN NET_BUF *Packet 1469 ) 1470 { 1471 IP6_ICMP_INFORMATION_HEAD Icmp; 1472 EFI_IPv6_ADDRESS Target; 1473 IP6_ETHER_ADDR_OPTION LinkLayerOption; 1474 BOOLEAN IsDAD; 1475 BOOLEAN IsUnicast; 1476 BOOLEAN IsMaintained; 1477 IP6_DAD_ENTRY *DupAddrDetect; 1478 IP6_INTERFACE *IpIf; 1479 IP6_NEIGHBOR_ENTRY *Neighbor; 1480 BOOLEAN Solicited; 1481 BOOLEAN UpdateCache; 1482 EFI_IPv6_ADDRESS Dest; 1483 UINT16 OptionLen; 1484 UINT8 *Option; 1485 BOOLEAN Provided; 1486 EFI_STATUS Status; 1487 VOID *MacAddress; 1488 1489 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp); 1490 NetbufCopy (Packet, sizeof (Icmp), sizeof (Target), Target.Addr); 1491 1492 // 1493 // Perform Message Validation: 1494 // The IP Hop Limit field has a value of 255, i.e., the packet 1495 // could not possibly have been forwarded by a router. 1496 // ICMP Code is 0. 1497 // Target Address is not a multicast address. 1498 // 1499 Status = EFI_INVALID_PARAMETER; 1500 1501 if (Head->HopLimit != IP6_HOP_LIMIT || Icmp.Head.Code != 0 || !NetIp6IsValidUnicast (&Target)) { 1502 goto Exit; 1503 } 1504 1505 // 1506 // ICMP length is 24 or more octets. 1507 // 1508 OptionLen = 0; 1509 if (Head->PayloadLength < IP6_ND_LENGTH) { 1510 goto Exit; 1511 } else { 1512 OptionLen = (UINT16) (Head->PayloadLength - IP6_ND_LENGTH); 1513 if (OptionLen != 0) { 1514 Option = NetbufGetByte (Packet, IP6_ND_LENGTH, NULL); 1515 ASSERT (Option != NULL); 1516 1517 // 1518 // All included options should have a length that is greater than zero. 1519 // 1520 if (!Ip6IsNDOptionValid (Option, OptionLen)) { 1521 goto Exit; 1522 } 1523 } 1524 } 1525 1526 IsDAD = NetIp6IsUnspecifiedAddr (&Head->SourceAddress); 1527 IsUnicast = (BOOLEAN) !Ip6IsSNMulticastAddr (&Head->DestinationAddress); 1528 IsMaintained = Ip6IsOneOfSetAddress (IpSb, &Target, &IpIf, NULL); 1529 1530 Provided = FALSE; 1531 if (OptionLen >= sizeof (IP6_ETHER_ADDR_OPTION)) { 1532 NetbufCopy ( 1533 Packet, 1534 IP6_ND_LENGTH, 1535 sizeof (IP6_ETHER_ADDR_OPTION), 1536 (UINT8 *) &LinkLayerOption 1537 ); 1538 // 1539 // The solicitation for neighbor discovery should include a source link-layer 1540 // address option. If the option is not recognized, silently ignore it. 1541 // 1542 if (LinkLayerOption.Type == Ip6OptionEtherSource) { 1543 if (IsDAD) { 1544 // 1545 // If the IP source address is the unspecified address, the source 1546 // link-layer address option must not be included in the message. 1547 // 1548 goto Exit; 1549 } 1550 1551 Provided = TRUE; 1552 } 1553 } 1554 1555 // 1556 // If the IP source address is the unspecified address, the IP 1557 // destination address is a solicited-node multicast address. 1558 // 1559 if (IsDAD && IsUnicast) { 1560 goto Exit; 1561 } 1562 1563 // 1564 // If the target address is tentative, and the source address is a unicast address, 1565 // the solicitation's sender is performing address resolution on the target; 1566 // the solicitation should be silently ignored. 1567 // 1568 if (!IsDAD && !IsMaintained) { 1569 goto Exit; 1570 } 1571 1572 // 1573 // If received unicast neighbor solicitation but destination is not this node, 1574 // drop the packet. 1575 // 1576 if (IsUnicast && !IsMaintained) { 1577 goto Exit; 1578 } 1579 1580 // 1581 // In DAD, when target address is a tentative address, 1582 // process the received neighbor solicitation message but not send out response. 1583 // 1584 if (IsDAD && !IsMaintained) { 1585 DupAddrDetect = Ip6FindDADEntry (IpSb, &Target, &IpIf); 1586 if (DupAddrDetect != NULL) { 1587 // 1588 // Check the MAC address of the incoming packet. 1589 // 1590 if (IpSb->RecvRequest.MnpToken.Packet.RxData == NULL) { 1591 goto Exit; 1592 } 1593 1594 MacAddress = IpSb->RecvRequest.MnpToken.Packet.RxData->SourceAddress; 1595 if (MacAddress != NULL) { 1596 if (CompareMem ( 1597 MacAddress, 1598 &IpSb->SnpMode.CurrentAddress, 1599 IpSb->SnpMode.HwAddressSize 1600 ) != 0) { 1601 // 1602 // The NS is from another node to performing DAD on the same address. 1603 // Fail DAD for the tentative address. 1604 // 1605 Ip6OnDADFinished (FALSE, IpIf, DupAddrDetect); 1606 Status = EFI_ICMP_ERROR; 1607 } else { 1608 // 1609 // The below layer loopback the NS we sent. Record it and wait for more. 1610 // 1611 DupAddrDetect->Receive++; 1612 Status = EFI_SUCCESS; 1613 } 1614 } 1615 } 1616 goto Exit; 1617 } 1618 1619 // 1620 // If the solicitation does not contain a link-layer address, DO NOT create or 1621 // update the neighbor cache entries. 1622 // 1623 if (Provided) { 1624 Neighbor = Ip6FindNeighborEntry (IpSb, &Head->SourceAddress); 1625 UpdateCache = FALSE; 1626 1627 if (Neighbor == NULL) { 1628 Neighbor = Ip6CreateNeighborEntry (IpSb, Ip6OnArpResolved, &Head->SourceAddress, NULL); 1629 if (Neighbor == NULL) { 1630 Status = EFI_OUT_OF_RESOURCES; 1631 goto Exit; 1632 } 1633 UpdateCache = TRUE; 1634 } else { 1635 if (CompareMem (Neighbor->LinkAddress.Addr, LinkLayerOption.EtherAddr, 6) != 0) { 1636 UpdateCache = TRUE; 1637 } 1638 } 1639 1640 if (UpdateCache) { 1641 Neighbor->State = EfiNeighborStale; 1642 Neighbor->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 1643 CopyMem (Neighbor->LinkAddress.Addr, LinkLayerOption.EtherAddr, 6); 1644 // 1645 // Send queued packets if exist. 1646 // 1647 Neighbor->CallBack ((VOID *) Neighbor); 1648 } 1649 } 1650 1651 // 1652 // Sends a Neighbor Advertisement as response. 1653 // Set the Router flag to zero since the node is a host. 1654 // If the source address of the solicitation is unspeicifed, and target address 1655 // is one of the maintained address, reply a unsolicited multicast advertisement. 1656 // 1657 if (IsDAD && IsMaintained) { 1658 Solicited = FALSE; 1659 Ip6SetToAllNodeMulticast (FALSE, IP6_LINK_LOCAL_SCOPE, &Dest); 1660 } else { 1661 Solicited = TRUE; 1662 IP6_COPY_ADDRESS (&Dest, &Head->SourceAddress); 1663 } 1664 1665 Status = Ip6SendNeighborAdvertise ( 1666 IpSb, 1667 &Target, 1668 &Dest, 1669 &Target, 1670 &IpSb->SnpMode.CurrentAddress, 1671 FALSE, 1672 TRUE, 1673 Solicited 1674 ); 1675 Exit: 1676 NetbufFree (Packet); 1677 return Status; 1678 } 1679 1680 /** 1681 Process the Neighbor Advertisement message. 1682 1683 @param[in] IpSb The IP service that received the packet. 1684 @param[in] Head The IP head of the message. 1685 @param[in] Packet The content of the message with IP head removed. 1686 1687 @retval EFI_SUCCESS The packet processed successfully. 1688 @retval EFI_INVALID_PARAMETER The packet is invalid. 1689 @retval EFI_ICMP_ERROR The packet indicates that DAD is failed. 1690 @retval Others Failed to process the packet. 1691 1692 **/ 1693 EFI_STATUS 1694 Ip6ProcessNeighborAdvertise ( 1695 IN IP6_SERVICE *IpSb, 1696 IN EFI_IP6_HEADER *Head, 1697 IN NET_BUF *Packet 1698 ) 1699 { 1700 IP6_ICMP_INFORMATION_HEAD Icmp; 1701 EFI_IPv6_ADDRESS Target; 1702 IP6_ETHER_ADDR_OPTION LinkLayerOption; 1703 BOOLEAN Provided; 1704 INTN Compare; 1705 IP6_NEIGHBOR_ENTRY *Neighbor; 1706 IP6_DEFAULT_ROUTER *DefaultRouter; 1707 BOOLEAN Solicited; 1708 BOOLEAN IsRouter; 1709 BOOLEAN Override; 1710 IP6_DAD_ENTRY *DupAddrDetect; 1711 IP6_INTERFACE *IpIf; 1712 UINT16 OptionLen; 1713 UINT8 *Option; 1714 EFI_STATUS Status; 1715 1716 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp); 1717 NetbufCopy (Packet, sizeof (Icmp), sizeof (Target), Target.Addr); 1718 1719 // 1720 // Validate the incoming Neighbor Advertisement 1721 // 1722 Status = EFI_INVALID_PARAMETER; 1723 // 1724 // The IP Hop Limit field has a value of 255, i.e., the packet 1725 // could not possibly have been forwarded by a router. 1726 // ICMP Code is 0. 1727 // Target Address is not a multicast address. 1728 // 1729 if (Head->HopLimit != IP6_HOP_LIMIT || Icmp.Head.Code != 0 || !NetIp6IsValidUnicast (&Target)) { 1730 goto Exit; 1731 } 1732 1733 // 1734 // ICMP length is 24 or more octets. 1735 // 1736 Provided = FALSE; 1737 OptionLen = 0; 1738 if (Head->PayloadLength < IP6_ND_LENGTH) { 1739 goto Exit; 1740 } else { 1741 OptionLen = (UINT16) (Head->PayloadLength - IP6_ND_LENGTH); 1742 if (OptionLen != 0) { 1743 Option = NetbufGetByte (Packet, IP6_ND_LENGTH, NULL); 1744 ASSERT (Option != NULL); 1745 1746 // 1747 // All included options should have a length that is greater than zero. 1748 // 1749 if (!Ip6IsNDOptionValid (Option, OptionLen)) { 1750 goto Exit; 1751 } 1752 } 1753 } 1754 1755 // 1756 // If the IP destination address is a multicast address, Solicited Flag is ZERO. 1757 // 1758 Solicited = FALSE; 1759 if ((Icmp.Fourth & IP6_SOLICITED_FLAG) == IP6_SOLICITED_FLAG) { 1760 Solicited = TRUE; 1761 } 1762 if (IP6_IS_MULTICAST (&Head->DestinationAddress) && Solicited) { 1763 goto Exit; 1764 } 1765 1766 // 1767 // DAD - Check whether the Target is one of our tentative address. 1768 // 1769 DupAddrDetect = Ip6FindDADEntry (IpSb, &Target, &IpIf); 1770 if (DupAddrDetect != NULL) { 1771 // 1772 // DAD fails, some other node is using this address. 1773 // 1774 NetbufFree (Packet); 1775 Ip6OnDADFinished (FALSE, IpIf, DupAddrDetect); 1776 return EFI_ICMP_ERROR; 1777 } 1778 1779 // 1780 // Search the Neighbor Cache for the target's entry. If no entry exists, 1781 // the advertisement should be silently discarded. 1782 // 1783 Neighbor = Ip6FindNeighborEntry (IpSb, &Target); 1784 if (Neighbor == NULL) { 1785 goto Exit; 1786 } 1787 1788 // 1789 // Get IsRouter Flag and Override Flag 1790 // 1791 IsRouter = FALSE; 1792 Override = FALSE; 1793 if ((Icmp.Fourth & IP6_IS_ROUTER_FLAG) == IP6_IS_ROUTER_FLAG) { 1794 IsRouter = TRUE; 1795 } 1796 if ((Icmp.Fourth & IP6_OVERRIDE_FLAG) == IP6_OVERRIDE_FLAG) { 1797 Override = TRUE; 1798 } 1799 1800 // 1801 // Check whether link layer option is included. 1802 // 1803 if (OptionLen >= sizeof (IP6_ETHER_ADDR_OPTION)) { 1804 NetbufCopy ( 1805 Packet, 1806 IP6_ND_LENGTH, 1807 sizeof (IP6_ETHER_ADDR_OPTION), 1808 (UINT8 *) &LinkLayerOption 1809 ); 1810 1811 if (LinkLayerOption.Type == Ip6OptionEtherTarget) { 1812 Provided = TRUE; 1813 } 1814 } 1815 1816 Compare = 0; 1817 if (Provided) { 1818 Compare = CompareMem (Neighbor->LinkAddress.Addr, LinkLayerOption.EtherAddr, 6); 1819 } 1820 1821 if (!Neighbor->IsRouter && IsRouter) { 1822 DefaultRouter = Ip6FindDefaultRouter (IpSb, &Target); 1823 if (DefaultRouter != NULL) { 1824 DefaultRouter->NeighborCache = Neighbor; 1825 } 1826 } 1827 1828 if (Neighbor->State == EfiNeighborInComplete) { 1829 // 1830 // If the target's Neighbor Cache entry is in INCOMPLETE state and no 1831 // Target Link-Layer address option is included while link layer has 1832 // address, the message should be silently discarded. 1833 // 1834 if (!Provided) { 1835 goto Exit; 1836 } 1837 // 1838 // Update the Neighbor Cache 1839 // 1840 CopyMem (Neighbor->LinkAddress.Addr, LinkLayerOption.EtherAddr, 6); 1841 if (Solicited) { 1842 Neighbor->State = EfiNeighborReachable; 1843 Neighbor->Ticks = IP6_GET_TICKS (IpSb->ReachableTime); 1844 } else { 1845 Neighbor->State = EfiNeighborStale; 1846 Neighbor->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 1847 // 1848 // Send any packets queued for the neighbor awaiting address resolution. 1849 // 1850 Neighbor->CallBack ((VOID *) Neighbor); 1851 } 1852 1853 Neighbor->IsRouter = IsRouter; 1854 1855 } else { 1856 if (!Override && Compare != 0) { 1857 // 1858 // When the Override Flag is clear and supplied link-layer address differs from 1859 // that in the cache, if the state of the entry is not REACHABLE, ignore the 1860 // message. Otherwise set it to STALE but do not update the entry in any 1861 // other way. 1862 // 1863 if (Neighbor->State == EfiNeighborReachable) { 1864 Neighbor->State = EfiNeighborStale; 1865 Neighbor->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 1866 } 1867 } else { 1868 if (Compare != 0) { 1869 CopyMem (Neighbor->LinkAddress.Addr, LinkLayerOption.EtherAddr, 6); 1870 } 1871 // 1872 // Update the entry's state 1873 // 1874 if (Solicited) { 1875 Neighbor->State = EfiNeighborReachable; 1876 Neighbor->Ticks = IP6_GET_TICKS (IpSb->ReachableTime); 1877 } else { 1878 if (Compare != 0) { 1879 Neighbor->State = EfiNeighborStale; 1880 Neighbor->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 1881 } 1882 } 1883 1884 // 1885 // When IsRouter is changed from TRUE to FALSE, remove the router from the 1886 // Default Router List and remove the Destination Cache entries for all destinations 1887 // using the neighbor as a router. 1888 // 1889 if (Neighbor->IsRouter && !IsRouter) { 1890 DefaultRouter = Ip6FindDefaultRouter (IpSb, &Target); 1891 if (DefaultRouter != NULL) { 1892 Ip6DestroyDefaultRouter (IpSb, DefaultRouter); 1893 } 1894 } 1895 1896 Neighbor->IsRouter = IsRouter; 1897 } 1898 } 1899 1900 if (Neighbor->State == EfiNeighborReachable) { 1901 Neighbor->CallBack ((VOID *) Neighbor); 1902 } 1903 1904 Status = EFI_SUCCESS; 1905 1906 Exit: 1907 NetbufFree (Packet); 1908 return Status; 1909 } 1910 1911 /** 1912 Process the Router Advertisement message according to RFC4861. 1913 1914 @param[in] IpSb The IP service that received the packet. 1915 @param[in] Head The IP head of the message. 1916 @param[in] Packet The content of the message with the IP head removed. 1917 1918 @retval EFI_SUCCESS The packet processed successfully. 1919 @retval EFI_INVALID_PARAMETER The packet is invalid. 1920 @retval EFI_OUT_OF_RESOURCES Insufficient resources to complete the 1921 operation. 1922 @retval Others Failed to process the packet. 1923 1924 **/ 1925 EFI_STATUS 1926 Ip6ProcessRouterAdvertise ( 1927 IN IP6_SERVICE *IpSb, 1928 IN EFI_IP6_HEADER *Head, 1929 IN NET_BUF *Packet 1930 ) 1931 { 1932 IP6_ICMP_INFORMATION_HEAD Icmp; 1933 UINT32 ReachableTime; 1934 UINT32 RetransTimer; 1935 UINT16 RouterLifetime; 1936 UINT16 Offset; 1937 UINT8 Type; 1938 UINT8 Length; 1939 IP6_ETHER_ADDR_OPTION LinkLayerOption; 1940 UINT32 Fourth; 1941 UINT8 CurHopLimit; 1942 BOOLEAN Mflag; 1943 BOOLEAN Oflag; 1944 IP6_DEFAULT_ROUTER *DefaultRouter; 1945 IP6_NEIGHBOR_ENTRY *NeighborCache; 1946 EFI_MAC_ADDRESS LinkLayerAddress; 1947 IP6_MTU_OPTION MTUOption; 1948 IP6_PREFIX_INFO_OPTION PrefixOption; 1949 IP6_PREFIX_LIST_ENTRY *PrefixList; 1950 BOOLEAN OnLink; 1951 BOOLEAN Autonomous; 1952 EFI_IPv6_ADDRESS StatelessAddress; 1953 EFI_STATUS Status; 1954 UINT16 OptionLen; 1955 UINT8 *Option; 1956 INTN Result; 1957 1958 Status = EFI_INVALID_PARAMETER; 1959 1960 if (IpSb->Ip6ConfigInstance.Policy != Ip6ConfigPolicyAutomatic) { 1961 // 1962 // Skip the process below as it's not required under the current policy. 1963 // 1964 goto Exit; 1965 } 1966 1967 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp); 1968 1969 // 1970 // Validate the incoming Router Advertisement 1971 // 1972 1973 // 1974 // The IP source address must be a link-local address 1975 // 1976 if (!NetIp6IsLinkLocalAddr (&Head->SourceAddress)) { 1977 goto Exit; 1978 } 1979 // 1980 // The IP Hop Limit field has a value of 255, i.e. the packet 1981 // could not possibly have been forwarded by a router. 1982 // ICMP Code is 0. 1983 // ICMP length (derived from the IP length) is 16 or more octets. 1984 // 1985 if (Head->HopLimit != IP6_HOP_LIMIT || Icmp.Head.Code != 0 || 1986 Head->PayloadLength < IP6_RA_LENGTH) { 1987 goto Exit; 1988 } 1989 1990 // 1991 // All included options have a length that is greater than zero. 1992 // 1993 OptionLen = (UINT16) (Head->PayloadLength - IP6_RA_LENGTH); 1994 if (OptionLen != 0) { 1995 Option = NetbufGetByte (Packet, IP6_RA_LENGTH, NULL); 1996 ASSERT (Option != NULL); 1997 1998 if (!Ip6IsNDOptionValid (Option, OptionLen)) { 1999 goto Exit; 2000 } 2001 } 2002 2003 // 2004 // Process Fourth field. 2005 // In Router Advertisement, Fourth is composed of CurHopLimit (8bit), M flag, O flag, 2006 // and Router Lifetime (16 bit). 2007 // 2008 2009 Fourth = NTOHL (Icmp.Fourth); 2010 CopyMem (&RouterLifetime, &Fourth, sizeof (UINT16)); 2011 2012 // 2013 // If the source address already in the default router list, update it. 2014 // Otherwise create a new entry. 2015 // A Lifetime of zero indicates that the router is not a default router. 2016 // 2017 DefaultRouter = Ip6FindDefaultRouter (IpSb, &Head->SourceAddress); 2018 if (DefaultRouter == NULL) { 2019 if (RouterLifetime != 0) { 2020 DefaultRouter = Ip6CreateDefaultRouter (IpSb, &Head->SourceAddress, RouterLifetime); 2021 if (DefaultRouter == NULL) { 2022 Status = EFI_OUT_OF_RESOURCES; 2023 goto Exit; 2024 } 2025 } 2026 } else { 2027 if (RouterLifetime != 0) { 2028 DefaultRouter->Lifetime = RouterLifetime; 2029 // 2030 // Check the corresponding neighbor cache entry here. 2031 // 2032 if (DefaultRouter->NeighborCache == NULL) { 2033 DefaultRouter->NeighborCache = Ip6FindNeighborEntry (IpSb, &Head->SourceAddress); 2034 } 2035 } else { 2036 // 2037 // If the address is in the host's default router list and the router lifetime is zero, 2038 // immediately time-out the entry. 2039 // 2040 Ip6DestroyDefaultRouter (IpSb, DefaultRouter); 2041 } 2042 } 2043 2044 CurHopLimit = *((UINT8 *) &Fourth + 3); 2045 if (CurHopLimit != 0) { 2046 IpSb->CurHopLimit = CurHopLimit; 2047 } 2048 2049 Mflag = FALSE; 2050 Oflag = FALSE; 2051 if ((*((UINT8 *) &Fourth + 2) & IP6_M_ADDR_CONFIG_FLAG) == IP6_M_ADDR_CONFIG_FLAG) { 2052 Mflag = TRUE; 2053 } else { 2054 if ((*((UINT8 *) &Fourth + 2) & IP6_O_CONFIG_FLAG) == IP6_O_CONFIG_FLAG) { 2055 Oflag = TRUE; 2056 } 2057 } 2058 2059 if (Mflag || Oflag) { 2060 // 2061 // Use Ip6Config to get available addresses or other configuration from DHCP. 2062 // 2063 Ip6ConfigStartStatefulAutoConfig (&IpSb->Ip6ConfigInstance, Oflag); 2064 } 2065 2066 // 2067 // Process Reachable Time and Retrans Timer fields. 2068 // 2069 NetbufCopy (Packet, sizeof (Icmp), sizeof (UINT32), (UINT8 *) &ReachableTime); 2070 NetbufCopy (Packet, sizeof (Icmp) + sizeof (UINT32), sizeof (UINT32), (UINT8 *) &RetransTimer); 2071 ReachableTime = NTOHL (ReachableTime); 2072 RetransTimer = NTOHL (RetransTimer); 2073 2074 if (ReachableTime != 0 && ReachableTime != IpSb->BaseReachableTime) { 2075 // 2076 // If new value is not unspecified and differs from the previous one, record it 2077 // in BaseReachableTime and recompute a ReachableTime. 2078 // 2079 IpSb->BaseReachableTime = ReachableTime; 2080 Ip6UpdateReachableTime (IpSb); 2081 } 2082 2083 if (RetransTimer != 0) { 2084 IpSb->RetransTimer = RetransTimer; 2085 } 2086 2087 // 2088 // IsRouter flag must be set to TRUE if corresponding neighbor cache entry exists. 2089 // 2090 NeighborCache = Ip6FindNeighborEntry (IpSb, &Head->SourceAddress); 2091 if (NeighborCache != NULL) { 2092 NeighborCache->IsRouter = TRUE; 2093 } 2094 2095 // 2096 // If an valid router advertisment is received, stops router solicitation. 2097 // 2098 IpSb->RouterAdvertiseReceived = TRUE; 2099 2100 // 2101 // The only defined options that may appear are the Source 2102 // Link-Layer Address, Prefix information and MTU options. 2103 // All included options have a length that is greater than zero. 2104 // 2105 Offset = 16; 2106 while (Offset < Head->PayloadLength) { 2107 NetbufCopy (Packet, Offset, sizeof (UINT8), &Type); 2108 switch (Type) { 2109 case Ip6OptionEtherSource: 2110 // 2111 // Update the neighbor cache 2112 // 2113 NetbufCopy (Packet, Offset, sizeof (IP6_ETHER_ADDR_OPTION), (UINT8 *) &LinkLayerOption); 2114 if (LinkLayerOption.Length <= 0) { 2115 goto Exit; 2116 } 2117 2118 ZeroMem (&LinkLayerAddress, sizeof (EFI_MAC_ADDRESS)); 2119 CopyMem (&LinkLayerAddress, LinkLayerOption.EtherAddr, 6); 2120 2121 if (NeighborCache == NULL) { 2122 NeighborCache = Ip6CreateNeighborEntry ( 2123 IpSb, 2124 Ip6OnArpResolved, 2125 &Head->SourceAddress, 2126 &LinkLayerAddress 2127 ); 2128 if (NeighborCache == NULL) { 2129 Status = EFI_OUT_OF_RESOURCES; 2130 goto Exit; 2131 } 2132 NeighborCache->IsRouter = TRUE; 2133 NeighborCache->State = EfiNeighborStale; 2134 NeighborCache->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2135 } else { 2136 Result = CompareMem (&LinkLayerAddress, &NeighborCache->LinkAddress, 6); 2137 2138 // 2139 // If the link-local address is the same as that already in the cache, 2140 // the cache entry's state remains unchanged. Otherwise update the 2141 // reachability state to STALE. 2142 // 2143 if ((NeighborCache->State == EfiNeighborInComplete) || (Result != 0)) { 2144 CopyMem (&NeighborCache->LinkAddress, &LinkLayerAddress, 6); 2145 2146 NeighborCache->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2147 2148 if (NeighborCache->State == EfiNeighborInComplete) { 2149 // 2150 // Send queued packets if exist. 2151 // 2152 NeighborCache->State = EfiNeighborStale; 2153 NeighborCache->CallBack ((VOID *) NeighborCache); 2154 } else { 2155 NeighborCache->State = EfiNeighborStale; 2156 } 2157 } 2158 } 2159 2160 Offset = (UINT16) (Offset + (UINT16) LinkLayerOption.Length * 8); 2161 break; 2162 case Ip6OptionPrefixInfo: 2163 NetbufCopy (Packet, Offset, sizeof (IP6_PREFIX_INFO_OPTION), (UINT8 *) &PrefixOption); 2164 if (PrefixOption.Length != 4) { 2165 goto Exit; 2166 } 2167 PrefixOption.ValidLifetime = NTOHL (PrefixOption.ValidLifetime); 2168 PrefixOption.PreferredLifetime = NTOHL (PrefixOption.PreferredLifetime); 2169 2170 // 2171 // Get L and A flag, recorded in the lower 2 bits of Reserved1 2172 // 2173 OnLink = FALSE; 2174 if ((PrefixOption.Reserved1 & IP6_ON_LINK_FLAG) == IP6_ON_LINK_FLAG) { 2175 OnLink = TRUE; 2176 } 2177 Autonomous = FALSE; 2178 if ((PrefixOption.Reserved1 & IP6_AUTO_CONFIG_FLAG) == IP6_AUTO_CONFIG_FLAG) { 2179 Autonomous = TRUE; 2180 } 2181 2182 // 2183 // If the prefix is the link-local prefix, silently ignore the prefix option. 2184 // 2185 if (PrefixOption.PrefixLength == IP6_LINK_LOCAL_PREFIX_LENGTH && 2186 NetIp6IsLinkLocalAddr (&PrefixOption.Prefix) 2187 ) { 2188 Offset += sizeof (IP6_PREFIX_INFO_OPTION); 2189 break; 2190 } 2191 // 2192 // Do following if on-link flag is set according to RFC4861. 2193 // 2194 if (OnLink) { 2195 PrefixList = Ip6FindPrefixListEntry ( 2196 IpSb, 2197 TRUE, 2198 PrefixOption.PrefixLength, 2199 &PrefixOption.Prefix 2200 ); 2201 // 2202 // Create a new entry for the prefix, if the ValidLifetime is zero, 2203 // silently ignore the prefix option. 2204 // 2205 if (PrefixList == NULL && PrefixOption.ValidLifetime != 0) { 2206 PrefixList = Ip6CreatePrefixListEntry ( 2207 IpSb, 2208 TRUE, 2209 PrefixOption.ValidLifetime, 2210 PrefixOption.PreferredLifetime, 2211 PrefixOption.PrefixLength, 2212 &PrefixOption.Prefix 2213 ); 2214 if (PrefixList == NULL) { 2215 Status = EFI_OUT_OF_RESOURCES; 2216 goto Exit; 2217 } 2218 } else if (PrefixList != NULL) { 2219 if (PrefixOption.ValidLifetime != 0) { 2220 PrefixList->ValidLifetime = PrefixOption.ValidLifetime; 2221 } else { 2222 // 2223 // If the prefix exists and incoming ValidLifetime is zero, immediately 2224 // remove the prefix. 2225 Ip6DestroyPrefixListEntry (IpSb, PrefixList, OnLink, TRUE); 2226 } 2227 } 2228 } 2229 2230 // 2231 // Do following if Autonomous flag is set according to RFC4862. 2232 // 2233 if (Autonomous && PrefixOption.PreferredLifetime <= PrefixOption.ValidLifetime) { 2234 PrefixList = Ip6FindPrefixListEntry ( 2235 IpSb, 2236 FALSE, 2237 PrefixOption.PrefixLength, 2238 &PrefixOption.Prefix 2239 ); 2240 // 2241 // Create a new entry for the prefix, and form an address by prefix + interface id 2242 // If the sum of the prefix length and interface identifier length 2243 // does not equal 128 bits, the Prefix Information option MUST be ignored. 2244 // 2245 if (PrefixList == NULL && 2246 PrefixOption.ValidLifetime != 0 && 2247 PrefixOption.PrefixLength + IpSb->InterfaceIdLen * 8 == 128 2248 ) { 2249 // 2250 // Form the address in network order. 2251 // 2252 CopyMem (&StatelessAddress, &PrefixOption.Prefix, sizeof (UINT64)); 2253 CopyMem (&StatelessAddress.Addr[8], IpSb->InterfaceId, sizeof (UINT64)); 2254 2255 // 2256 // If the address is not yet in the assigned address list, adds it into. 2257 // 2258 if (!Ip6IsOneOfSetAddress (IpSb, &StatelessAddress, NULL, NULL)) { 2259 // 2260 // And also not in the DAD process, check its uniqeness firstly. 2261 // 2262 if (Ip6FindDADEntry (IpSb, &StatelessAddress, NULL) == NULL) { 2263 Status = Ip6SetAddress ( 2264 IpSb->DefaultInterface, 2265 &StatelessAddress, 2266 FALSE, 2267 PrefixOption.PrefixLength, 2268 PrefixOption.ValidLifetime, 2269 PrefixOption.PreferredLifetime, 2270 NULL, 2271 NULL 2272 ); 2273 if (EFI_ERROR (Status)) { 2274 goto Exit; 2275 } 2276 } 2277 } 2278 2279 // 2280 // Adds the prefix option to stateless prefix option list. 2281 // 2282 PrefixList = Ip6CreatePrefixListEntry ( 2283 IpSb, 2284 FALSE, 2285 PrefixOption.ValidLifetime, 2286 PrefixOption.PreferredLifetime, 2287 PrefixOption.PrefixLength, 2288 &PrefixOption.Prefix 2289 ); 2290 if (PrefixList == NULL) { 2291 Status = EFI_OUT_OF_RESOURCES; 2292 goto Exit; 2293 } 2294 } else if (PrefixList != NULL) { 2295 2296 // 2297 // Reset the preferred lifetime of the address if the advertised prefix exists. 2298 // Perform specific action to valid lifetime together. 2299 // 2300 PrefixList->PreferredLifetime = PrefixOption.PreferredLifetime; 2301 if ((PrefixOption.ValidLifetime > 7200) || 2302 (PrefixOption.ValidLifetime > PrefixList->ValidLifetime)) { 2303 // 2304 // If the received Valid Lifetime is greater than 2 hours or 2305 // greater than RemainingLifetime, set the valid lifetime of the 2306 // corresponding address to the advertised Valid Lifetime. 2307 // 2308 PrefixList->ValidLifetime = PrefixOption.ValidLifetime; 2309 2310 } else if (PrefixList->ValidLifetime <= 7200) { 2311 // 2312 // If RemainingLifetime is less than or equls to 2 hours, ignore the 2313 // Prefix Information option with regards to the valid lifetime. 2314 // TODO: If this option has been authenticated, set the valid lifetime. 2315 // 2316 } else { 2317 // 2318 // Otherwise, reset the valid lifetime of the corresponding 2319 // address to 2 hours. 2320 // 2321 PrefixList->ValidLifetime = 7200; 2322 } 2323 } 2324 } 2325 2326 Offset += sizeof (IP6_PREFIX_INFO_OPTION); 2327 break; 2328 case Ip6OptionMtu: 2329 NetbufCopy (Packet, Offset, sizeof (IP6_MTU_OPTION), (UINT8 *) &MTUOption); 2330 if (MTUOption.Length != 1) { 2331 goto Exit; 2332 } 2333 2334 // 2335 // Use IPv6 minimum link MTU 1280 bytes as the maximum packet size in order 2336 // to omit implementation of Path MTU Discovery. Thus ignore the MTU option 2337 // in Router Advertisement. 2338 // 2339 2340 Offset += sizeof (IP6_MTU_OPTION); 2341 break; 2342 default: 2343 // 2344 // Silently ignore unrecognized options 2345 // 2346 NetbufCopy (Packet, Offset + sizeof (UINT8), sizeof (UINT8), &Length); 2347 if (Length <= 0) { 2348 goto Exit; 2349 } 2350 2351 Offset = (UINT16) (Offset + (UINT16) Length * 8); 2352 break; 2353 } 2354 } 2355 2356 Status = EFI_SUCCESS; 2357 2358 Exit: 2359 NetbufFree (Packet); 2360 return Status; 2361 } 2362 2363 /** 2364 Process the ICMPv6 redirect message. Find the instance, then update 2365 its route cache. 2366 2367 @param[in] IpSb The IP6 service binding instance that received 2368 the packet. 2369 @param[in] Head The IP head of the received ICMPv6 packet. 2370 @param[in] Packet The content of the ICMPv6 redirect packet with 2371 the IP head removed. 2372 2373 @retval EFI_INVALID_PARAMETER The parameter is invalid. 2374 @retval EFI_OUT_OF_RESOURCES Insuffcient resources to complete the 2375 operation. 2376 @retval EFI_SUCCESS Successfully updated the route caches. 2377 2378 **/ 2379 EFI_STATUS 2380 Ip6ProcessRedirect ( 2381 IN IP6_SERVICE *IpSb, 2382 IN EFI_IP6_HEADER *Head, 2383 IN NET_BUF *Packet 2384 ) 2385 { 2386 IP6_ICMP_INFORMATION_HEAD *Icmp; 2387 EFI_IPv6_ADDRESS *Target; 2388 EFI_IPv6_ADDRESS *IcmpDest; 2389 UINT8 *Option; 2390 UINT16 OptionLen; 2391 IP6_ROUTE_ENTRY *RouteEntry; 2392 IP6_ROUTE_CACHE_ENTRY *RouteCache; 2393 IP6_NEIGHBOR_ENTRY *NeighborCache; 2394 INT32 Length; 2395 UINT8 OptLen; 2396 IP6_ETHER_ADDR_OPTION *LinkLayerOption; 2397 EFI_MAC_ADDRESS Mac; 2398 UINT32 Index; 2399 BOOLEAN IsRouter; 2400 EFI_STATUS Status; 2401 INTN Result; 2402 2403 Status = EFI_INVALID_PARAMETER; 2404 2405 Icmp = (IP6_ICMP_INFORMATION_HEAD *) NetbufGetByte (Packet, 0, NULL); 2406 if (Icmp == NULL) { 2407 goto Exit; 2408 } 2409 2410 // 2411 // Validate the incoming Redirect message 2412 // 2413 2414 // 2415 // The IP Hop Limit field has a value of 255, i.e. the packet 2416 // could not possibly have been forwarded by a router. 2417 // ICMP Code is 0. 2418 // ICMP length (derived from the IP length) is 40 or more octets. 2419 // 2420 if (Head->HopLimit != IP6_HOP_LIMIT || Icmp->Head.Code != 0 || 2421 Head->PayloadLength < IP6_REDITECT_LENGTH) { 2422 goto Exit; 2423 } 2424 2425 // 2426 // The IP source address must be a link-local address 2427 // 2428 if (!NetIp6IsLinkLocalAddr (&Head->SourceAddress)) { 2429 goto Exit; 2430 } 2431 2432 // 2433 // The dest of this ICMP redirect message is not us. 2434 // 2435 if (!Ip6IsOneOfSetAddress (IpSb, &Head->DestinationAddress, NULL, NULL)) { 2436 goto Exit; 2437 } 2438 2439 // 2440 // All included options have a length that is greater than zero. 2441 // 2442 OptionLen = (UINT16) (Head->PayloadLength - IP6_REDITECT_LENGTH); 2443 if (OptionLen != 0) { 2444 Option = NetbufGetByte (Packet, IP6_REDITECT_LENGTH, NULL); 2445 ASSERT (Option != NULL); 2446 2447 if (!Ip6IsNDOptionValid (Option, OptionLen)) { 2448 goto Exit; 2449 } 2450 } 2451 2452 Target = (EFI_IPv6_ADDRESS *) (Icmp + 1); 2453 IcmpDest = Target + 1; 2454 2455 // 2456 // The ICMP Destination Address field in the redirect message does not contain 2457 // a multicast address. 2458 // 2459 if (IP6_IS_MULTICAST (IcmpDest)) { 2460 goto Exit; 2461 } 2462 2463 // 2464 // The ICMP Target Address is either a link-local address (when redirected to 2465 // a router) or the same as the ICMP Destination Address (when redirected to 2466 // the on-link destination). 2467 // 2468 IsRouter = (BOOLEAN) !EFI_IP6_EQUAL (Target, IcmpDest); 2469 if (!NetIp6IsLinkLocalAddr (Target) && IsRouter) { 2470 goto Exit; 2471 } 2472 2473 // 2474 // Check the options. The only interested option here is the target-link layer 2475 // address option. 2476 // 2477 Length = Packet->TotalSize - 40; 2478 Option = (UINT8 *) (IcmpDest + 1); 2479 LinkLayerOption = NULL; 2480 while (Length > 0) { 2481 switch (*Option) { 2482 case Ip6OptionEtherTarget: 2483 2484 LinkLayerOption = (IP6_ETHER_ADDR_OPTION *) Option; 2485 OptLen = LinkLayerOption->Length; 2486 if (OptLen != 1) { 2487 // 2488 // For ethernet, the length must be 1. 2489 // 2490 goto Exit; 2491 } 2492 break; 2493 2494 default: 2495 2496 OptLen = *(Option + 1); 2497 if (OptLen == 0) { 2498 // 2499 // A length of 0 is invalid. 2500 // 2501 goto Exit; 2502 } 2503 break; 2504 } 2505 2506 Length -= 8 * OptLen; 2507 Option += 8 * OptLen; 2508 } 2509 2510 if (Length != 0) { 2511 goto Exit; 2512 } 2513 2514 // 2515 // The IP source address of the Redirect is the same as the current 2516 // first-hop router for the specified ICMP Destination Address. 2517 // 2518 RouteCache = Ip6FindRouteCache (IpSb->RouteTable, IcmpDest, &Head->DestinationAddress); 2519 if (RouteCache != NULL) { 2520 if (!EFI_IP6_EQUAL (&RouteCache->NextHop, &Head->SourceAddress)) { 2521 // 2522 // The source of this Redirect message must match the NextHop of the 2523 // corresponding route cache entry. 2524 // 2525 goto Exit; 2526 } 2527 2528 // 2529 // Update the NextHop. 2530 // 2531 IP6_COPY_ADDRESS (&RouteCache->NextHop, Target); 2532 2533 if (!IsRouter) { 2534 RouteEntry = (IP6_ROUTE_ENTRY *) RouteCache->Tag; 2535 RouteEntry->Flag = RouteEntry->Flag | IP6_DIRECT_ROUTE; 2536 } 2537 2538 } else { 2539 // 2540 // Get the Route Entry. 2541 // 2542 RouteEntry = Ip6FindRouteEntry (IpSb->RouteTable, IcmpDest, NULL); 2543 if (RouteEntry == NULL) { 2544 RouteEntry = Ip6CreateRouteEntry (IcmpDest, 0, NULL); 2545 if (RouteEntry == NULL) { 2546 Status = EFI_OUT_OF_RESOURCES; 2547 goto Exit; 2548 } 2549 } 2550 2551 if (!IsRouter) { 2552 RouteEntry->Flag = IP6_DIRECT_ROUTE; 2553 } 2554 2555 // 2556 // Create a route cache for this. 2557 // 2558 RouteCache = Ip6CreateRouteCacheEntry ( 2559 IcmpDest, 2560 &Head->DestinationAddress, 2561 Target, 2562 (UINTN) RouteEntry 2563 ); 2564 if (RouteCache == NULL) { 2565 Status = EFI_OUT_OF_RESOURCES; 2566 goto Exit; 2567 } 2568 2569 // 2570 // Insert the newly created route cache entry. 2571 // 2572 Index = IP6_ROUTE_CACHE_HASH (IcmpDest, &Head->DestinationAddress); 2573 InsertHeadList (&IpSb->RouteTable->Cache.CacheBucket[Index], &RouteCache->Link); 2574 } 2575 2576 // 2577 // Try to locate the neighbor cache for the Target. 2578 // 2579 NeighborCache = Ip6FindNeighborEntry (IpSb, Target); 2580 2581 if (LinkLayerOption != NULL) { 2582 if (NeighborCache == NULL) { 2583 // 2584 // Create a neighbor cache for the Target. 2585 // 2586 ZeroMem (&Mac, sizeof (EFI_MAC_ADDRESS)); 2587 CopyMem (&Mac, LinkLayerOption->EtherAddr, 6); 2588 NeighborCache = Ip6CreateNeighborEntry (IpSb, Ip6OnArpResolved, Target, &Mac); 2589 if (NeighborCache == NULL) { 2590 // 2591 // Just report a success here. The neighbor cache can be created in 2592 // some other place. 2593 // 2594 Status = EFI_SUCCESS; 2595 goto Exit; 2596 } 2597 2598 NeighborCache->State = EfiNeighborStale; 2599 NeighborCache->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2600 } else { 2601 Result = CompareMem (LinkLayerOption->EtherAddr, &NeighborCache->LinkAddress, 6); 2602 2603 // 2604 // If the link-local address is the same as that already in the cache, 2605 // the cache entry's state remains unchanged. Otherwise update the 2606 // reachability state to STALE. 2607 // 2608 if ((NeighborCache->State == EfiNeighborInComplete) || (Result != 0)) { 2609 CopyMem (&NeighborCache->LinkAddress, LinkLayerOption->EtherAddr, 6); 2610 2611 NeighborCache->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2612 2613 if (NeighborCache->State == EfiNeighborInComplete) { 2614 // 2615 // Send queued packets if exist. 2616 // 2617 NeighborCache->State = EfiNeighborStale; 2618 NeighborCache->CallBack ((VOID *) NeighborCache); 2619 } else { 2620 NeighborCache->State = EfiNeighborStale; 2621 } 2622 } 2623 } 2624 } 2625 2626 if (NeighborCache != NULL && IsRouter) { 2627 // 2628 // The Target is a router, set IsRouter to TRUE. 2629 // 2630 NeighborCache->IsRouter = TRUE; 2631 } 2632 2633 Status = EFI_SUCCESS; 2634 2635 Exit: 2636 NetbufFree (Packet); 2637 return Status; 2638 } 2639 2640 /** 2641 Add Neighbor cache entries. It is a work function for EfiIp6Neighbors(). 2642 2643 @param[in] IpSb The IP6 service binding instance. 2644 @param[in] TargetIp6Address Pointer to Target IPv6 address. 2645 @param[in] TargetLinkAddress Pointer to link-layer address of the target. Ignored if NULL. 2646 @param[in] Timeout Time in 100-ns units that this entry will remain in the neighbor 2647 cache. It will be deleted after Timeout. A value of zero means that 2648 the entry is permanent. A non-zero value means that the entry is 2649 dynamic. 2650 @param[in] Override If TRUE, the cached link-layer address of the matching entry will 2651 be overridden and updated; if FALSE, and if a 2652 corresponding cache entry already existed, EFI_ACCESS_DENIED 2653 will be returned. 2654 2655 @retval EFI_SUCCESS The neighbor cache entry has been added. 2656 @retval EFI_OUT_OF_RESOURCES Could not add the entry to the neighbor cache 2657 due to insufficient resources. 2658 @retval EFI_NOT_FOUND TargetLinkAddress is NULL. 2659 @retval EFI_ACCESS_DENIED The to-be-added entry is already defined in the neighbor cache, 2660 and that entry is tagged as un-overridden (when DeleteFlag 2661 is FALSE). 2662 2663 **/ 2664 EFI_STATUS 2665 Ip6AddNeighbor ( 2666 IN IP6_SERVICE *IpSb, 2667 IN EFI_IPv6_ADDRESS *TargetIp6Address, 2668 IN EFI_MAC_ADDRESS *TargetLinkAddress OPTIONAL, 2669 IN UINT32 Timeout, 2670 IN BOOLEAN Override 2671 ) 2672 { 2673 IP6_NEIGHBOR_ENTRY *Neighbor; 2674 2675 Neighbor = Ip6FindNeighborEntry (IpSb, TargetIp6Address); 2676 if (Neighbor != NULL) { 2677 if (!Override) { 2678 return EFI_ACCESS_DENIED; 2679 } else { 2680 if (TargetLinkAddress != NULL) { 2681 IP6_COPY_LINK_ADDRESS (&Neighbor->LinkAddress, TargetLinkAddress); 2682 } 2683 } 2684 } else { 2685 if (TargetLinkAddress == NULL) { 2686 return EFI_NOT_FOUND; 2687 } 2688 2689 Neighbor = Ip6CreateNeighborEntry (IpSb, Ip6OnArpResolved, TargetIp6Address, TargetLinkAddress); 2690 if (Neighbor == NULL) { 2691 return EFI_OUT_OF_RESOURCES; 2692 } 2693 } 2694 2695 Neighbor->State = EfiNeighborReachable; 2696 2697 if (Timeout != 0) { 2698 Neighbor->Ticks = IP6_GET_TICKS (Timeout / TICKS_PER_MS); 2699 Neighbor->Dynamic = TRUE; 2700 } else { 2701 Neighbor->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2702 } 2703 2704 return EFI_SUCCESS; 2705 } 2706 2707 /** 2708 Delete or update Neighbor cache entries. It is a work function for EfiIp6Neighbors(). 2709 2710 @param[in] IpSb The IP6 service binding instance. 2711 @param[in] TargetIp6Address Pointer to Target IPv6 address. 2712 @param[in] TargetLinkAddress Pointer to link-layer address of the target. Ignored if NULL. 2713 @param[in] Timeout Time in 100-ns units that this entry will remain in the neighbor 2714 cache. It will be deleted after Timeout. A value of zero means that 2715 the entry is permanent. A non-zero value means that the entry is 2716 dynamic. 2717 @param[in] Override If TRUE, the cached link-layer address of the matching entry will 2718 be overridden and updated; if FALSE, and if a 2719 corresponding cache entry already existed, EFI_ACCESS_DENIED 2720 will be returned. 2721 2722 @retval EFI_SUCCESS The neighbor cache entry has been updated or deleted. 2723 @retval EFI_NOT_FOUND This entry is not in the neighbor cache. 2724 2725 **/ 2726 EFI_STATUS 2727 Ip6DelNeighbor ( 2728 IN IP6_SERVICE *IpSb, 2729 IN EFI_IPv6_ADDRESS *TargetIp6Address, 2730 IN EFI_MAC_ADDRESS *TargetLinkAddress OPTIONAL, 2731 IN UINT32 Timeout, 2732 IN BOOLEAN Override 2733 ) 2734 { 2735 IP6_NEIGHBOR_ENTRY *Neighbor; 2736 2737 Neighbor = Ip6FindNeighborEntry (IpSb, TargetIp6Address); 2738 if (Neighbor == NULL) { 2739 return EFI_NOT_FOUND; 2740 } 2741 2742 RemoveEntryList (&Neighbor->Link); 2743 FreePool (Neighbor); 2744 2745 return EFI_SUCCESS; 2746 } 2747 2748 /** 2749 The heartbeat timer of ND module in IP6_TIMER_INTERVAL_IN_MS milliseconds. 2750 This time routine handles DAD module and neighbor state transition. 2751 It is also responsible for sending out router solicitations. 2752 2753 @param[in] Event The IP6 service instance's heartbeat timer. 2754 @param[in] Context The IP6 service instance. 2755 2756 **/ 2757 VOID 2758 EFIAPI 2759 Ip6NdFasterTimerTicking ( 2760 IN EFI_EVENT Event, 2761 IN VOID *Context 2762 ) 2763 { 2764 LIST_ENTRY *Entry; 2765 LIST_ENTRY *Next; 2766 LIST_ENTRY *Entry2; 2767 IP6_INTERFACE *IpIf; 2768 IP6_DELAY_JOIN_LIST *DelayNode; 2769 EFI_IPv6_ADDRESS Source; 2770 IP6_DAD_ENTRY *DupAddrDetect; 2771 EFI_STATUS Status; 2772 IP6_NEIGHBOR_ENTRY *NeighborCache; 2773 EFI_IPv6_ADDRESS Destination; 2774 IP6_SERVICE *IpSb; 2775 BOOLEAN Flag; 2776 2777 IpSb = (IP6_SERVICE *) Context; 2778 NET_CHECK_SIGNATURE (IpSb, IP6_SERVICE_SIGNATURE); 2779 2780 ZeroMem (&Source, sizeof (EFI_IPv6_ADDRESS)); 2781 2782 // 2783 // A host SHOULD transmit up to MAX_RTR_SOLICITATIONS (3) Router 2784 // Solicitation messages, each separated by at least 2785 // RTR_SOLICITATION_INTERVAL (4) seconds. 2786 // 2787 if ((IpSb->Ip6ConfigInstance.Policy == Ip6ConfigPolicyAutomatic) && 2788 !IpSb->RouterAdvertiseReceived && 2789 IpSb->SolicitTimer > 0 2790 ) { 2791 if ((IpSb->Ticks == 0) || (--IpSb->Ticks == 0)) { 2792 Status = Ip6SendRouterSolicit (IpSb, NULL, NULL, NULL, NULL); 2793 if (!EFI_ERROR (Status)) { 2794 IpSb->SolicitTimer--; 2795 IpSb->Ticks = (UINT32) IP6_GET_TICKS (IP6_RTR_SOLICITATION_INTERVAL); 2796 } 2797 } 2798 } 2799 2800 NET_LIST_FOR_EACH (Entry, &IpSb->Interfaces) { 2801 IpIf = NET_LIST_USER_STRUCT (Entry, IP6_INTERFACE, Link); 2802 2803 // 2804 // Process the delay list to join the solicited-node multicast address. 2805 // 2806 NET_LIST_FOR_EACH_SAFE (Entry2, Next, &IpIf->DelayJoinList) { 2807 DelayNode = NET_LIST_USER_STRUCT (Entry2, IP6_DELAY_JOIN_LIST, Link); 2808 if ((DelayNode->DelayTime == 0) || (--DelayNode->DelayTime == 0)) { 2809 // 2810 // The timer expires, init the duplicate address detection. 2811 // 2812 Ip6InitDADProcess ( 2813 DelayNode->Interface, 2814 DelayNode->AddressInfo, 2815 DelayNode->DadCallback, 2816 DelayNode->Context 2817 ); 2818 2819 // 2820 // Remove the delay node 2821 // 2822 RemoveEntryList (&DelayNode->Link); 2823 FreePool (DelayNode); 2824 } 2825 } 2826 2827 // 2828 // Process the duplicate address detection list. 2829 // 2830 NET_LIST_FOR_EACH_SAFE (Entry2, Next, &IpIf->DupAddrDetectList) { 2831 DupAddrDetect = NET_LIST_USER_STRUCT (Entry2, IP6_DAD_ENTRY, Link); 2832 2833 if ((DupAddrDetect->RetransTick == 0) || (--DupAddrDetect->RetransTick == 0)) { 2834 // 2835 // The timer expires, check the remaining transmit counts. 2836 // 2837 if (DupAddrDetect->Transmit < DupAddrDetect->MaxTransmit) { 2838 // 2839 // Send the Neighbor Solicitation message with 2840 // Source - unspecified address, destination - solicited-node multicast address 2841 // Target - the address to be validated 2842 // 2843 Status = Ip6SendNeighborSolicit ( 2844 IpSb, 2845 NULL, 2846 &DupAddrDetect->Destination, 2847 &DupAddrDetect->AddressInfo->Address, 2848 NULL 2849 ); 2850 if (EFI_ERROR (Status)) { 2851 return; 2852 } 2853 2854 DupAddrDetect->Transmit++; 2855 DupAddrDetect->RetransTick = IP6_GET_TICKS (IpSb->RetransTimer); 2856 } else { 2857 // 2858 // All required solicitation has been sent out, and the RetransTime after the last 2859 // Neighbor Solicit is elapsed, finish the DAD process. 2860 // 2861 Flag = FALSE; 2862 if ((DupAddrDetect->Receive == 0) || 2863 (DupAddrDetect->Transmit <= DupAddrDetect->Receive)) { 2864 Flag = TRUE; 2865 } 2866 2867 Ip6OnDADFinished (Flag, IpIf, DupAddrDetect); 2868 } 2869 } 2870 } 2871 } 2872 2873 // 2874 // Polling the state of Neighbor cache 2875 // 2876 NET_LIST_FOR_EACH_SAFE (Entry, Next, &IpSb->NeighborTable) { 2877 NeighborCache = NET_LIST_USER_STRUCT (Entry, IP6_NEIGHBOR_ENTRY, Link); 2878 2879 switch (NeighborCache->State) { 2880 case EfiNeighborInComplete: 2881 if (NeighborCache->Ticks > 0) { 2882 --NeighborCache->Ticks; 2883 } 2884 2885 // 2886 // Retransmit Neighbor Solicitation messages approximately every 2887 // RetransTimer milliseconds while awaiting a response. 2888 // 2889 if (NeighborCache->Ticks == 0) { 2890 if (NeighborCache->Transmit > 1) { 2891 // 2892 // Send out multicast neighbor solicitation for address resolution. 2893 // After last neighbor solicitation message has been sent out, wait 2894 // for RetransTimer and then remove entry if no response is received. 2895 // 2896 Ip6CreateSNMulticastAddr (&NeighborCache->Neighbor, &Destination); 2897 Status = Ip6SelectSourceAddress (IpSb, &NeighborCache->Neighbor, &Source); 2898 if (EFI_ERROR (Status)) { 2899 return; 2900 } 2901 2902 Status = Ip6SendNeighborSolicit ( 2903 IpSb, 2904 &Source, 2905 &Destination, 2906 &NeighborCache->Neighbor, 2907 &IpSb->SnpMode.CurrentAddress 2908 ); 2909 if (EFI_ERROR (Status)) { 2910 return; 2911 } 2912 } 2913 2914 // 2915 // Update the retransmit times. 2916 // 2917 if (NeighborCache->Transmit > 0) { 2918 --NeighborCache->Transmit; 2919 NeighborCache->Ticks = IP6_GET_TICKS (IpSb->RetransTimer); 2920 } 2921 } 2922 2923 if (NeighborCache->Transmit == 0) { 2924 // 2925 // Timeout, send ICMP destination unreachable packet and then remove entry 2926 // 2927 Status = Ip6FreeNeighborEntry ( 2928 IpSb, 2929 NeighborCache, 2930 TRUE, 2931 TRUE, 2932 EFI_ICMP_ERROR, 2933 NULL, 2934 NULL 2935 ); 2936 if (EFI_ERROR (Status)) { 2937 return; 2938 } 2939 } 2940 2941 break; 2942 2943 case EfiNeighborReachable: 2944 // 2945 // This entry is inserted by EfiIp6Neighbors() as static entry 2946 // and will not timeout. 2947 // 2948 if (!NeighborCache->Dynamic && (NeighborCache->Ticks == IP6_INFINIT_LIFETIME)) { 2949 break; 2950 } 2951 2952 if ((NeighborCache->Ticks == 0) || (--NeighborCache->Ticks == 0)) { 2953 if (NeighborCache->Dynamic) { 2954 // 2955 // This entry is inserted by EfiIp6Neighbors() as dynamic entry 2956 // and will be deleted after timeout. 2957 // 2958 Status = Ip6FreeNeighborEntry ( 2959 IpSb, 2960 NeighborCache, 2961 FALSE, 2962 TRUE, 2963 EFI_TIMEOUT, 2964 NULL, 2965 NULL 2966 ); 2967 if (EFI_ERROR (Status)) { 2968 return; 2969 } 2970 } else { 2971 NeighborCache->State = EfiNeighborStale; 2972 NeighborCache->Ticks = (UINT32) IP6_INFINIT_LIFETIME; 2973 } 2974 } 2975 2976 break; 2977 2978 case EfiNeighborDelay: 2979 if ((NeighborCache->Ticks == 0) || (--NeighborCache->Ticks == 0)) { 2980 2981 NeighborCache->State = EfiNeighborProbe; 2982 NeighborCache->Ticks = IP6_GET_TICKS (IpSb->RetransTimer); 2983 NeighborCache->Transmit = IP6_MAX_UNICAST_SOLICIT + 1; 2984 // 2985 // Send out unicast neighbor solicitation for Neighbor Unreachability Detection 2986 // 2987 Status = Ip6SelectSourceAddress (IpSb, &NeighborCache->Neighbor, &Source); 2988 if (EFI_ERROR (Status)) { 2989 return; 2990 } 2991 2992 Status = Ip6SendNeighborSolicit ( 2993 IpSb, 2994 &Source, 2995 &NeighborCache->Neighbor, 2996 &NeighborCache->Neighbor, 2997 &IpSb->SnpMode.CurrentAddress 2998 ); 2999 if (EFI_ERROR (Status)) { 3000 return; 3001 } 3002 3003 NeighborCache->Transmit--; 3004 } 3005 3006 break; 3007 3008 case EfiNeighborProbe: 3009 if (NeighborCache->Ticks > 0) { 3010 --NeighborCache->Ticks; 3011 } 3012 3013 // 3014 // Retransmit Neighbor Solicitation messages approximately every 3015 // RetransTimer milliseconds while awaiting a response. 3016 // 3017 if (NeighborCache->Ticks == 0) { 3018 if (NeighborCache->Transmit > 1) { 3019 // 3020 // Send out unicast neighbor solicitation for Neighbor Unreachability 3021 // Detection. After last neighbor solicitation message has been sent out, 3022 // wait for RetransTimer and then remove entry if no response is received. 3023 // 3024 Status = Ip6SelectSourceAddress (IpSb, &NeighborCache->Neighbor, &Source); 3025 if (EFI_ERROR (Status)) { 3026 return; 3027 } 3028 3029 Status = Ip6SendNeighborSolicit ( 3030 IpSb, 3031 &Source, 3032 &NeighborCache->Neighbor, 3033 &NeighborCache->Neighbor, 3034 &IpSb->SnpMode.CurrentAddress 3035 ); 3036 if (EFI_ERROR (Status)) { 3037 return; 3038 } 3039 } 3040 3041 // 3042 // Update the retransmit times. 3043 // 3044 if (NeighborCache->Transmit > 0) { 3045 --NeighborCache->Transmit; 3046 NeighborCache->Ticks = IP6_GET_TICKS (IpSb->RetransTimer); 3047 } 3048 } 3049 3050 if (NeighborCache->Transmit == 0) { 3051 // 3052 // Delete the neighbor entry. 3053 // 3054 Status = Ip6FreeNeighborEntry ( 3055 IpSb, 3056 NeighborCache, 3057 FALSE, 3058 TRUE, 3059 EFI_TIMEOUT, 3060 NULL, 3061 NULL 3062 ); 3063 if (EFI_ERROR (Status)) { 3064 return; 3065 } 3066 } 3067 3068 break; 3069 3070 default: 3071 break; 3072 } 3073 } 3074 } 3075 3076 /** 3077 The heartbeat timer of ND module in 1 second. This time routine handles following 3078 things: 1) maitain default router list; 2) maintain prefix options; 3079 3) maintain route caches. 3080 3081 @param[in] IpSb The IP6 service binding instance. 3082 3083 **/ 3084 VOID 3085 Ip6NdTimerTicking ( 3086 IN IP6_SERVICE *IpSb 3087 ) 3088 { 3089 LIST_ENTRY *Entry; 3090 LIST_ENTRY *Next; 3091 IP6_DEFAULT_ROUTER *DefaultRouter; 3092 IP6_PREFIX_LIST_ENTRY *PrefixOption; 3093 UINT8 Index; 3094 IP6_ROUTE_CACHE_ENTRY *RouteCache; 3095 3096 // 3097 // Decrease the lifetime of default router, if expires remove it from default router list. 3098 // 3099 NET_LIST_FOR_EACH_SAFE (Entry, Next, &IpSb->DefaultRouterList) { 3100 DefaultRouter = NET_LIST_USER_STRUCT (Entry, IP6_DEFAULT_ROUTER, Link); 3101 if (DefaultRouter->Lifetime != IP6_INF_ROUTER_LIFETIME) { 3102 if ((DefaultRouter->Lifetime == 0) || (--DefaultRouter->Lifetime == 0)) { 3103 Ip6DestroyDefaultRouter (IpSb, DefaultRouter); 3104 } 3105 } 3106 } 3107 3108 // 3109 // Decrease Valid lifetime and Preferred lifetime of Prefix options and corresponding addresses. 3110 // 3111 NET_LIST_FOR_EACH_SAFE (Entry, Next, &IpSb->AutonomousPrefix) { 3112 PrefixOption = NET_LIST_USER_STRUCT (Entry, IP6_PREFIX_LIST_ENTRY, Link); 3113 if (PrefixOption->ValidLifetime != (UINT32) IP6_INFINIT_LIFETIME) { 3114 if ((PrefixOption->ValidLifetime > 0) && (--PrefixOption->ValidLifetime > 0)) { 3115 if ((PrefixOption->PreferredLifetime != (UINT32) IP6_INFINIT_LIFETIME) && 3116 (PrefixOption->PreferredLifetime > 0) 3117 ) { 3118 --PrefixOption->PreferredLifetime; 3119 } 3120 } else { 3121 Ip6DestroyPrefixListEntry (IpSb, PrefixOption, FALSE, TRUE); 3122 } 3123 } 3124 } 3125 3126 NET_LIST_FOR_EACH_SAFE (Entry, Next, &IpSb->OnlinkPrefix) { 3127 PrefixOption = NET_LIST_USER_STRUCT (Entry, IP6_PREFIX_LIST_ENTRY, Link); 3128 if (PrefixOption->ValidLifetime != (UINT32) IP6_INFINIT_LIFETIME) { 3129 if ((PrefixOption->ValidLifetime == 0) || (--PrefixOption->ValidLifetime == 0)) { 3130 Ip6DestroyPrefixListEntry (IpSb, PrefixOption, TRUE, TRUE); 3131 } 3132 } 3133 } 3134 3135 // 3136 // Each bucket of route cache can contain at most IP6_ROUTE_CACHE_MAX entries. 3137 // Remove the entries at the tail of the bucket. These entries 3138 // are likely to be used least. 3139 // Reclaim frequency is set to 1 second. 3140 // 3141 for (Index = 0; Index < IP6_ROUTE_CACHE_HASH_SIZE; Index++) { 3142 while (IpSb->RouteTable->Cache.CacheNum[Index] > IP6_ROUTE_CACHE_MAX) { 3143 Entry = NetListRemoveTail (&IpSb->RouteTable->Cache.CacheBucket[Index]); 3144 if (Entry == NULL) { 3145 break; 3146 } 3147 3148 RouteCache = NET_LIST_USER_STRUCT (Entry, IP6_ROUTE_CACHE_ENTRY, Link); 3149 Ip6FreeRouteCacheEntry (RouteCache); 3150 ASSERT (IpSb->RouteTable->Cache.CacheNum[Index] > 0); 3151 IpSb->RouteTable->Cache.CacheNum[Index]--; 3152 } 3153 } 3154 } 3155 3156