1 /** @file 2 IpIo Library. 3 4 (C) Copyright 2014 Hewlett-Packard Development Company, L.P.<BR> 5 Copyright (c) 2005 - 2009, Intel Corporation. All rights reserved.<BR> 6 This program and the accompanying materials 7 are licensed and made available under the terms and conditions of the BSD License 8 which accompanies this distribution. The full text of the license may be found at 9 http://opensource.org/licenses/bsd-license.php 10 11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. 13 **/ 14 15 #include <Uefi.h> 16 17 #include <Protocol/Udp4.h> 18 19 #include <Library/IpIoLib.h> 20 #include <Library/BaseLib.h> 21 #include <Library/DebugLib.h> 22 #include <Library/BaseMemoryLib.h> 23 #include <Library/UefiBootServicesTableLib.h> 24 #include <Library/MemoryAllocationLib.h> 25 #include <Library/DpcLib.h> 26 27 28 GLOBAL_REMOVE_IF_UNREFERENCED LIST_ENTRY mActiveIpIoList = { 29 &mActiveIpIoList, 30 &mActiveIpIoList 31 }; 32 33 GLOBAL_REMOVE_IF_UNREFERENCED EFI_IP4_CONFIG_DATA mIp4IoDefaultIpConfigData = { 34 EFI_IP_PROTO_UDP, 35 FALSE, 36 TRUE, 37 FALSE, 38 FALSE, 39 FALSE, 40 {{0, 0, 0, 0}}, 41 {{0, 0, 0, 0}}, 42 0, 43 255, 44 FALSE, 45 FALSE, 46 0, 47 0 48 }; 49 50 GLOBAL_REMOVE_IF_UNREFERENCED EFI_IP6_CONFIG_DATA mIp6IoDefaultIpConfigData = { 51 EFI_IP_PROTO_UDP, 52 FALSE, 53 TRUE, 54 FALSE, 55 {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, 56 {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, 57 0, 58 255, 59 0, 60 0, 61 0 62 }; 63 64 GLOBAL_REMOVE_IF_UNREFERENCED ICMP_ERROR_INFO mIcmpErrMap[10] = { 65 {FALSE, TRUE }, // ICMP_ERR_UNREACH_NET 66 {FALSE, TRUE }, // ICMP_ERR_UNREACH_HOST 67 {TRUE, TRUE }, // ICMP_ERR_UNREACH_PROTOCOL 68 {TRUE, TRUE }, // ICMP_ERR_UNREACH_PORT 69 {TRUE, TRUE }, // ICMP_ERR_MSGSIZE 70 {FALSE, TRUE }, // ICMP_ERR_UNREACH_SRCFAIL 71 {FALSE, TRUE }, // ICMP_ERR_TIMXCEED_INTRANS 72 {FALSE, TRUE }, // ICMP_ERR_TIMEXCEED_REASS 73 {FALSE, FALSE}, // ICMP_ERR_QUENCH 74 {FALSE, TRUE } // ICMP_ERR_PARAMPROB 75 }; 76 77 GLOBAL_REMOVE_IF_UNREFERENCED ICMP_ERROR_INFO mIcmp6ErrMap[10] = { 78 {FALSE, TRUE}, // ICMP6_ERR_UNREACH_NET 79 {FALSE, TRUE}, // ICMP6_ERR_UNREACH_HOST 80 {TRUE, TRUE}, // ICMP6_ERR_UNREACH_PROTOCOL 81 {TRUE, TRUE}, // ICMP6_ERR_UNREACH_PORT 82 {TRUE, TRUE}, // ICMP6_ERR_PACKAGE_TOOBIG 83 {FALSE, TRUE}, // ICMP6_ERR_TIMXCEED_HOPLIMIT 84 {FALSE, TRUE}, // ICMP6_ERR_TIMXCEED_REASS 85 {FALSE, TRUE}, // ICMP6_ERR_PARAMPROB_HEADER 86 {FALSE, TRUE}, // ICMP6_ERR_PARAMPROB_NEXHEADER 87 {FALSE, TRUE} // ICMP6_ERR_PARAMPROB_IPV6OPTION 88 }; 89 90 91 /** 92 Notify function for IP transmit token. 93 94 @param[in] Context The context passed in by the event notifier. 95 96 **/ 97 VOID 98 EFIAPI 99 IpIoTransmitHandlerDpc ( 100 IN VOID *Context 101 ); 102 103 104 /** 105 Notify function for IP transmit token. 106 107 @param[in] Event The event signaled. 108 @param[in] Context The context passed in by the event notifier. 109 110 **/ 111 VOID 112 EFIAPI 113 IpIoTransmitHandler ( 114 IN EFI_EVENT Event, 115 IN VOID *Context 116 ); 117 118 119 /** 120 This function create an IP child ,open the IP protocol, and return the opened 121 IP protocol as Interface. 122 123 @param[in] ControllerHandle The controller handle. 124 @param[in] ImageHandle The image handle. 125 @param[in] ChildHandle Pointer to the buffer to save the IP child handle. 126 @param[in] IpVersion The version of the IP protocol to use, either 127 IPv4 or IPv6. 128 @param[out] Interface Pointer used to get the IP protocol interface. 129 130 @retval EFI_SUCCESS The IP child is created and the IP protocol 131 interface is retrieved. 132 @retval Others The required operation failed. 133 134 **/ 135 EFI_STATUS 136 IpIoCreateIpChildOpenProtocol ( 137 IN EFI_HANDLE ControllerHandle, 138 IN EFI_HANDLE ImageHandle, 139 IN EFI_HANDLE *ChildHandle, 140 IN UINT8 IpVersion, 141 OUT VOID **Interface 142 ) 143 { 144 EFI_STATUS Status; 145 EFI_GUID *ServiceBindingGuid; 146 EFI_GUID *IpProtocolGuid; 147 148 if (IpVersion == IP_VERSION_4) { 149 ServiceBindingGuid = &gEfiIp4ServiceBindingProtocolGuid; 150 IpProtocolGuid = &gEfiIp4ProtocolGuid; 151 } else if (IpVersion == IP_VERSION_6){ 152 ServiceBindingGuid = &gEfiIp6ServiceBindingProtocolGuid; 153 IpProtocolGuid = &gEfiIp6ProtocolGuid; 154 } else { 155 return EFI_UNSUPPORTED; 156 } 157 158 // 159 // Create an IP child. 160 // 161 Status = NetLibCreateServiceChild ( 162 ControllerHandle, 163 ImageHandle, 164 ServiceBindingGuid, 165 ChildHandle 166 ); 167 if (EFI_ERROR (Status)) { 168 return Status; 169 } 170 171 // 172 // Open the IP protocol installed on the *ChildHandle. 173 // 174 Status = gBS->OpenProtocol ( 175 *ChildHandle, 176 IpProtocolGuid, 177 Interface, 178 ImageHandle, 179 ControllerHandle, 180 EFI_OPEN_PROTOCOL_BY_DRIVER 181 ); 182 if (EFI_ERROR (Status)) { 183 // 184 // On failure, destroy the IP child. 185 // 186 NetLibDestroyServiceChild ( 187 ControllerHandle, 188 ImageHandle, 189 ServiceBindingGuid, 190 *ChildHandle 191 ); 192 } 193 194 return Status; 195 } 196 197 198 /** 199 This function close the previously openned IP protocol and destroy the IP child. 200 201 @param[in] ControllerHandle The controller handle. 202 @param[in] ImageHandle The image handle. 203 @param[in] ChildHandle The child handle of the IP child. 204 @param[in] IpVersion The version of the IP protocol to use, either 205 IPv4 or IPv6. 206 207 @retval EFI_SUCCESS The IP protocol is closed and the relevant IP child 208 is destroyed. 209 @retval Others The required operation failed. 210 211 **/ 212 EFI_STATUS 213 IpIoCloseProtocolDestroyIpChild ( 214 IN EFI_HANDLE ControllerHandle, 215 IN EFI_HANDLE ImageHandle, 216 IN EFI_HANDLE ChildHandle, 217 IN UINT8 IpVersion 218 ) 219 { 220 EFI_STATUS Status; 221 EFI_GUID *ServiceBindingGuid; 222 EFI_GUID *IpProtocolGuid; 223 224 if (IpVersion == IP_VERSION_4) { 225 ServiceBindingGuid = &gEfiIp4ServiceBindingProtocolGuid; 226 IpProtocolGuid = &gEfiIp4ProtocolGuid; 227 } else if (IpVersion == IP_VERSION_6) { 228 ServiceBindingGuid = &gEfiIp6ServiceBindingProtocolGuid; 229 IpProtocolGuid = &gEfiIp6ProtocolGuid; 230 } else { 231 return EFI_UNSUPPORTED; 232 } 233 234 // 235 // Close the previously openned IP protocol. 236 // 237 gBS->CloseProtocol ( 238 ChildHandle, 239 IpProtocolGuid, 240 ImageHandle, 241 ControllerHandle 242 ); 243 244 // 245 // Destroy the IP child. 246 // 247 Status = NetLibDestroyServiceChild ( 248 ControllerHandle, 249 ImageHandle, 250 ServiceBindingGuid, 251 ChildHandle 252 ); 253 254 return Status; 255 } 256 257 /** 258 This function handles ICMPv4 packets. It is the worker function of 259 IpIoIcmpHandler. 260 261 @param[in] IpIo Pointer to the IP_IO instance. 262 @param[in, out] Pkt Pointer to the ICMPv4 packet. 263 @param[in] Session Pointer to the net session of this ICMPv4 packet. 264 265 @retval EFI_SUCCESS The ICMPv4 packet is handled successfully. 266 @retval EFI_ABORTED This type of ICMPv4 packet is not supported. 267 268 **/ 269 EFI_STATUS 270 IpIoIcmpv4Handler ( 271 IN IP_IO *IpIo, 272 IN OUT NET_BUF *Pkt, 273 IN EFI_NET_SESSION_DATA *Session 274 ) 275 { 276 IP4_ICMP_ERROR_HEAD *IcmpHdr; 277 EFI_IP4_HEADER *IpHdr; 278 UINT8 IcmpErr; 279 UINT8 *PayLoadHdr; 280 UINT8 Type; 281 UINT8 Code; 282 UINT32 TrimBytes; 283 284 ASSERT (IpIo->IpVersion == IP_VERSION_4); 285 286 IcmpHdr = NET_PROTO_HDR (Pkt, IP4_ICMP_ERROR_HEAD); 287 IpHdr = (EFI_IP4_HEADER *) (&IcmpHdr->IpHead); 288 289 // 290 // Check the ICMP packet length. 291 // 292 if (Pkt->TotalSize < ICMP_ERRLEN (IpHdr)) { 293 294 return EFI_ABORTED; 295 } 296 297 Type = IcmpHdr->Head.Type; 298 Code = IcmpHdr->Head.Code; 299 300 // 301 // Analyze the ICMP Error in this ICMP pkt 302 // 303 switch (Type) { 304 case ICMP_TYPE_UNREACH: 305 switch (Code) { 306 case ICMP_CODE_UNREACH_NET: 307 case ICMP_CODE_UNREACH_HOST: 308 case ICMP_CODE_UNREACH_PROTOCOL: 309 case ICMP_CODE_UNREACH_PORT: 310 case ICMP_CODE_UNREACH_SRCFAIL: 311 IcmpErr = (UINT8) (ICMP_ERR_UNREACH_NET + Code); 312 313 break; 314 315 case ICMP_CODE_UNREACH_NEEDFRAG: 316 IcmpErr = ICMP_ERR_MSGSIZE; 317 318 break; 319 320 case ICMP_CODE_UNREACH_NET_UNKNOWN: 321 case ICMP_CODE_UNREACH_NET_PROHIB: 322 case ICMP_CODE_UNREACH_TOSNET: 323 IcmpErr = ICMP_ERR_UNREACH_NET; 324 325 break; 326 327 case ICMP_CODE_UNREACH_HOST_UNKNOWN: 328 case ICMP_CODE_UNREACH_ISOLATED: 329 case ICMP_CODE_UNREACH_HOST_PROHIB: 330 case ICMP_CODE_UNREACH_TOSHOST: 331 IcmpErr = ICMP_ERR_UNREACH_HOST; 332 333 break; 334 335 default: 336 return EFI_ABORTED; 337 } 338 339 break; 340 341 case ICMP_TYPE_TIMXCEED: 342 if (Code > 1) { 343 return EFI_ABORTED; 344 } 345 346 IcmpErr = (UINT8) (Code + ICMP_ERR_TIMXCEED_INTRANS); 347 348 break; 349 350 case ICMP_TYPE_PARAMPROB: 351 if (Code > 1) { 352 return EFI_ABORTED; 353 } 354 355 IcmpErr = ICMP_ERR_PARAMPROB; 356 357 break; 358 359 case ICMP_TYPE_SOURCEQUENCH: 360 if (Code != 0) { 361 return EFI_ABORTED; 362 } 363 364 IcmpErr = ICMP_ERR_QUENCH; 365 366 break; 367 368 default: 369 return EFI_ABORTED; 370 } 371 372 // 373 // Notify user the ICMP pkt only containing payload except 374 // IP and ICMP header 375 // 376 PayLoadHdr = (UINT8 *) ((UINT8 *) IpHdr + EFI_IP4_HEADER_LEN (IpHdr)); 377 TrimBytes = (UINT32) (PayLoadHdr - (UINT8 *) IcmpHdr); 378 379 NetbufTrim (Pkt, TrimBytes, TRUE); 380 381 IpIo->PktRcvdNotify (EFI_ICMP_ERROR, IcmpErr, Session, Pkt, IpIo->RcvdContext); 382 383 return EFI_SUCCESS; 384 } 385 386 /** 387 This function handles ICMPv6 packets. It is the worker function of 388 IpIoIcmpHandler. 389 390 @param[in] IpIo Pointer to the IP_IO instance. 391 @param[in, out] Pkt Pointer to the ICMPv6 packet. 392 @param[in] Session Pointer to the net session of this ICMPv6 packet. 393 394 @retval EFI_SUCCESS The ICMPv6 packet is handled successfully. 395 @retval EFI_ABORTED This type of ICMPv6 packet is not supported. 396 397 **/ 398 EFI_STATUS 399 IpIoIcmpv6Handler ( 400 IN IP_IO *IpIo, 401 IN OUT NET_BUF *Pkt, 402 IN EFI_NET_SESSION_DATA *Session 403 ) 404 { 405 IP6_ICMP_ERROR_HEAD *IcmpHdr; 406 EFI_IP6_HEADER *IpHdr; 407 UINT8 IcmpErr; 408 UINT8 *PayLoadHdr; 409 UINT8 Type; 410 UINT8 Code; 411 UINT8 NextHeader; 412 UINT32 TrimBytes; 413 BOOLEAN Flag; 414 415 ASSERT (IpIo->IpVersion == IP_VERSION_6); 416 417 // 418 // Check the ICMPv6 packet length. 419 // 420 if (Pkt->TotalSize < sizeof (IP6_ICMP_ERROR_HEAD)) { 421 422 return EFI_ABORTED; 423 } 424 425 IcmpHdr = NET_PROTO_HDR (Pkt, IP6_ICMP_ERROR_HEAD); 426 Type = IcmpHdr->Head.Type; 427 Code = IcmpHdr->Head.Code; 428 429 // 430 // Analyze the ICMPv6 Error in this ICMPv6 packet 431 // 432 switch (Type) { 433 case ICMP_V6_DEST_UNREACHABLE: 434 switch (Code) { 435 case ICMP_V6_NO_ROUTE_TO_DEST: 436 case ICMP_V6_BEYOND_SCOPE: 437 case ICMP_V6_ROUTE_REJECTED: 438 IcmpErr = ICMP6_ERR_UNREACH_NET; 439 440 break; 441 442 case ICMP_V6_COMM_PROHIBITED: 443 case ICMP_V6_ADDR_UNREACHABLE: 444 case ICMP_V6_SOURCE_ADDR_FAILED: 445 IcmpErr = ICMP6_ERR_UNREACH_HOST; 446 447 break; 448 449 case ICMP_V6_PORT_UNREACHABLE: 450 IcmpErr = ICMP6_ERR_UNREACH_PORT; 451 452 break; 453 454 default: 455 return EFI_ABORTED; 456 } 457 458 break; 459 460 case ICMP_V6_PACKET_TOO_BIG: 461 if (Code >= 1) { 462 return EFI_ABORTED; 463 } 464 465 IcmpErr = ICMP6_ERR_PACKAGE_TOOBIG; 466 467 break; 468 469 case ICMP_V6_TIME_EXCEEDED: 470 if (Code > 1) { 471 return EFI_ABORTED; 472 } 473 474 IcmpErr = (UINT8) (ICMP6_ERR_TIMXCEED_HOPLIMIT + Code); 475 476 break; 477 478 case ICMP_V6_PARAMETER_PROBLEM: 479 if (Code > 3) { 480 return EFI_ABORTED; 481 } 482 483 IcmpErr = (UINT8) (ICMP6_ERR_PARAMPROB_HEADER + Code); 484 485 break; 486 487 default: 488 489 return EFI_ABORTED; 490 } 491 492 // 493 // Notify user the ICMPv6 packet only containing payload except 494 // IPv6 basic header, extension header and ICMP header 495 // 496 497 IpHdr = (EFI_IP6_HEADER *) (&IcmpHdr->IpHead); 498 NextHeader = IpHdr->NextHeader; 499 PayLoadHdr = (UINT8 *) ((UINT8 *) IcmpHdr + sizeof (IP6_ICMP_ERROR_HEAD)); 500 Flag = TRUE; 501 502 do { 503 switch (NextHeader) { 504 case EFI_IP_PROTO_UDP: 505 case EFI_IP_PROTO_TCP: 506 case EFI_IP_PROTO_ICMP: 507 case IP6_NO_NEXT_HEADER: 508 Flag = FALSE; 509 510 break; 511 512 case IP6_HOP_BY_HOP: 513 case IP6_DESTINATION: 514 // 515 // The Hdr Ext Len is 8-bit unsigned integer in 8-octet units, not including 516 // the first 8 octets. 517 // 518 NextHeader = *(PayLoadHdr); 519 PayLoadHdr = (UINT8 *) (PayLoadHdr + (*(PayLoadHdr + 1) + 1) * 8); 520 521 break; 522 523 case IP6_FRAGMENT: 524 // 525 // The Fragment Header Length is 8 octets. 526 // 527 NextHeader = *(PayLoadHdr); 528 PayLoadHdr = (UINT8 *) (PayLoadHdr + 8); 529 530 break; 531 532 default: 533 534 return EFI_ABORTED; 535 } 536 } while (Flag); 537 538 TrimBytes = (UINT32) (PayLoadHdr - (UINT8 *) IcmpHdr); 539 540 NetbufTrim (Pkt, TrimBytes, TRUE); 541 542 IpIo->PktRcvdNotify (EFI_ICMP_ERROR, IcmpErr, Session, Pkt, IpIo->RcvdContext); 543 544 return EFI_SUCCESS; 545 } 546 547 /** 548 This function handles ICMP packets. 549 550 @param[in] IpIo Pointer to the IP_IO instance. 551 @param[in, out] Pkt Pointer to the ICMP packet. 552 @param[in] Session Pointer to the net session of this ICMP packet. 553 554 @retval EFI_SUCCESS The ICMP packet is handled successfully. 555 @retval EFI_ABORTED This type of ICMP packet is not supported. 556 @retval EFI_UNSUPPORTED The IP protocol version in IP_IO is not supported. 557 558 **/ 559 EFI_STATUS 560 IpIoIcmpHandler ( 561 IN IP_IO *IpIo, 562 IN OUT NET_BUF *Pkt, 563 IN EFI_NET_SESSION_DATA *Session 564 ) 565 { 566 567 if (IpIo->IpVersion == IP_VERSION_4) { 568 569 return IpIoIcmpv4Handler (IpIo, Pkt, Session); 570 571 } else if (IpIo->IpVersion == IP_VERSION_6) { 572 573 return IpIoIcmpv6Handler (IpIo, Pkt, Session); 574 575 } else { 576 577 return EFI_UNSUPPORTED; 578 } 579 } 580 581 582 /** 583 Free function for receive token of IP_IO. It is used to 584 signal the recycle event to notify IP to recycle the 585 data buffer. 586 587 @param[in] Event The event to be signaled. 588 589 **/ 590 VOID 591 EFIAPI 592 IpIoExtFree ( 593 IN VOID *Event 594 ) 595 { 596 gBS->SignalEvent ((EFI_EVENT) Event); 597 } 598 599 600 /** 601 Create a send entry to wrap a packet before sending 602 out it through IP. 603 604 @param[in, out] IpIo Pointer to the IP_IO instance. 605 @param[in, out] Pkt Pointer to the packet. 606 @param[in] Sender Pointer to the IP sender. 607 @param[in] Context Pointer to the context. 608 @param[in] NotifyData Pointer to the notify data. 609 @param[in] Dest Pointer to the destination IP address. 610 @param[in] Override Pointer to the overriden IP_IO data. 611 612 @return Pointer to the data structure created to wrap the packet. If NULL, 613 @return resource limit occurred. 614 615 **/ 616 IP_IO_SEND_ENTRY * 617 IpIoCreateSndEntry ( 618 IN OUT IP_IO *IpIo, 619 IN OUT NET_BUF *Pkt, 620 IN IP_IO_IP_PROTOCOL Sender, 621 IN VOID *Context OPTIONAL, 622 IN VOID *NotifyData OPTIONAL, 623 IN EFI_IP_ADDRESS *Dest OPTIONAL, 624 IN IP_IO_OVERRIDE *Override 625 ) 626 { 627 IP_IO_SEND_ENTRY *SndEntry; 628 EFI_EVENT Event; 629 EFI_STATUS Status; 630 NET_FRAGMENT *ExtFragment; 631 UINT32 FragmentCount; 632 IP_IO_OVERRIDE *OverrideData; 633 IP_IO_IP_TX_DATA *TxData; 634 EFI_IP4_TRANSMIT_DATA *Ip4TxData; 635 EFI_IP6_TRANSMIT_DATA *Ip6TxData; 636 637 if ((IpIo->IpVersion != IP_VERSION_4) && (IpIo->IpVersion != IP_VERSION_6)) { 638 return NULL; 639 } 640 641 Event = NULL; 642 TxData = NULL; 643 OverrideData = NULL; 644 645 // 646 // Allocate resource for SndEntry 647 // 648 SndEntry = AllocatePool (sizeof (IP_IO_SEND_ENTRY)); 649 if (NULL == SndEntry) { 650 return NULL; 651 } 652 653 Status = gBS->CreateEvent ( 654 EVT_NOTIFY_SIGNAL, 655 TPL_NOTIFY, 656 IpIoTransmitHandler, 657 SndEntry, 658 &Event 659 ); 660 if (EFI_ERROR (Status)) { 661 goto ON_ERROR; 662 } 663 664 FragmentCount = Pkt->BlockOpNum; 665 666 // 667 // Allocate resource for TxData 668 // 669 TxData = (IP_IO_IP_TX_DATA *) AllocatePool ( 670 sizeof (IP_IO_IP_TX_DATA) + sizeof (NET_FRAGMENT) * (FragmentCount - 1) 671 ); 672 673 if (NULL == TxData) { 674 goto ON_ERROR; 675 } 676 677 // 678 // Build a fragment table to contain the fragments in the packet. 679 // 680 if (IpIo->IpVersion == IP_VERSION_4) { 681 ExtFragment = (NET_FRAGMENT *) TxData->Ip4TxData.FragmentTable; 682 } else { 683 ExtFragment = (NET_FRAGMENT *) TxData->Ip6TxData.FragmentTable; 684 } 685 686 NetbufBuildExt (Pkt, ExtFragment, &FragmentCount); 687 688 689 // 690 // Allocate resource for OverrideData if needed 691 // 692 if (NULL != Override) { 693 694 OverrideData = AllocateCopyPool (sizeof (IP_IO_OVERRIDE), Override); 695 if (NULL == OverrideData) { 696 goto ON_ERROR; 697 } 698 } 699 700 // 701 // Set other fields of TxData except the fragment table 702 // 703 if (IpIo->IpVersion == IP_VERSION_4) { 704 705 Ip4TxData = &TxData->Ip4TxData; 706 707 IP4_COPY_ADDRESS (&Ip4TxData->DestinationAddress, Dest); 708 709 Ip4TxData->OverrideData = &OverrideData->Ip4OverrideData; 710 Ip4TxData->OptionsLength = 0; 711 Ip4TxData->OptionsBuffer = NULL; 712 Ip4TxData->TotalDataLength = Pkt->TotalSize; 713 Ip4TxData->FragmentCount = FragmentCount; 714 715 // 716 // Set the fields of SndToken 717 // 718 SndEntry->SndToken.Ip4Token.Event = Event; 719 SndEntry->SndToken.Ip4Token.Packet.TxData = Ip4TxData; 720 } else { 721 722 Ip6TxData = &TxData->Ip6TxData; 723 724 if (Dest != NULL) { 725 CopyMem (&Ip6TxData->DestinationAddress, Dest, sizeof (EFI_IPv6_ADDRESS)); 726 } else { 727 ZeroMem (&Ip6TxData->DestinationAddress, sizeof (EFI_IPv6_ADDRESS)); 728 } 729 730 Ip6TxData->OverrideData = &OverrideData->Ip6OverrideData; 731 Ip6TxData->DataLength = Pkt->TotalSize; 732 Ip6TxData->FragmentCount = FragmentCount; 733 Ip6TxData->ExtHdrsLength = 0; 734 Ip6TxData->ExtHdrs = NULL; 735 736 // 737 // Set the fields of SndToken 738 // 739 SndEntry->SndToken.Ip6Token.Event = Event; 740 SndEntry->SndToken.Ip6Token.Packet.TxData = Ip6TxData; 741 } 742 743 // 744 // Set the fields of SndEntry 745 // 746 SndEntry->IpIo = IpIo; 747 SndEntry->Ip = Sender; 748 SndEntry->Context = Context; 749 SndEntry->NotifyData = NotifyData; 750 751 SndEntry->Pkt = Pkt; 752 NET_GET_REF (Pkt); 753 754 InsertTailList (&IpIo->PendingSndList, &SndEntry->Entry); 755 756 return SndEntry; 757 758 ON_ERROR: 759 760 if (OverrideData != NULL) { 761 FreePool (OverrideData); 762 } 763 764 if (TxData != NULL) { 765 FreePool (TxData); 766 } 767 768 if (SndEntry != NULL) { 769 FreePool (SndEntry); 770 } 771 772 if (Event != NULL) { 773 gBS->CloseEvent (Event); 774 } 775 776 return NULL; 777 } 778 779 780 /** 781 Destroy the SndEntry. 782 783 This function pairs with IpIoCreateSndEntry(). 784 785 @param[in] SndEntry Pointer to the send entry to be destroyed. 786 787 **/ 788 VOID 789 IpIoDestroySndEntry ( 790 IN IP_IO_SEND_ENTRY *SndEntry 791 ) 792 { 793 EFI_EVENT Event; 794 IP_IO_IP_TX_DATA *TxData; 795 IP_IO_OVERRIDE *Override; 796 797 if (SndEntry->IpIo->IpVersion == IP_VERSION_4) { 798 Event = SndEntry->SndToken.Ip4Token.Event; 799 TxData = (IP_IO_IP_TX_DATA *) SndEntry->SndToken.Ip4Token.Packet.TxData; 800 Override = (IP_IO_OVERRIDE *) TxData->Ip4TxData.OverrideData; 801 } else if (SndEntry->IpIo->IpVersion == IP_VERSION_6) { 802 Event = SndEntry->SndToken.Ip6Token.Event; 803 TxData = (IP_IO_IP_TX_DATA *) SndEntry->SndToken.Ip6Token.Packet.TxData; 804 Override = (IP_IO_OVERRIDE *) TxData->Ip6TxData.OverrideData; 805 } else { 806 return ; 807 } 808 809 gBS->CloseEvent (Event); 810 811 FreePool (TxData); 812 813 if (NULL != Override) { 814 FreePool (Override); 815 } 816 817 NetbufFree (SndEntry->Pkt); 818 819 RemoveEntryList (&SndEntry->Entry); 820 821 FreePool (SndEntry); 822 } 823 824 825 /** 826 Notify function for IP transmit token. 827 828 @param[in] Context The context passed in by the event notifier. 829 830 **/ 831 VOID 832 EFIAPI 833 IpIoTransmitHandlerDpc ( 834 IN VOID *Context 835 ) 836 { 837 IP_IO *IpIo; 838 IP_IO_SEND_ENTRY *SndEntry; 839 EFI_STATUS Status; 840 841 SndEntry = (IP_IO_SEND_ENTRY *) Context; 842 843 IpIo = SndEntry->IpIo; 844 845 if (IpIo->IpVersion == IP_VERSION_4) { 846 Status = SndEntry->SndToken.Ip4Token.Status; 847 } else if (IpIo->IpVersion == IP_VERSION_6){ 848 Status = SndEntry->SndToken.Ip6Token.Status; 849 } else { 850 return ; 851 } 852 853 if ((IpIo->PktSentNotify != NULL) && (SndEntry->NotifyData != NULL)) { 854 IpIo->PktSentNotify ( 855 Status, 856 SndEntry->Context, 857 SndEntry->Ip, 858 SndEntry->NotifyData 859 ); 860 } 861 862 IpIoDestroySndEntry (SndEntry); 863 } 864 865 866 /** 867 Notify function for IP transmit token. 868 869 @param[in] Event The event signaled. 870 @param[in] Context The context passed in by the event notifier. 871 872 **/ 873 VOID 874 EFIAPI 875 IpIoTransmitHandler ( 876 IN EFI_EVENT Event, 877 IN VOID *Context 878 ) 879 { 880 // 881 // Request IpIoTransmitHandlerDpc as a DPC at TPL_CALLBACK 882 // 883 QueueDpc (TPL_CALLBACK, IpIoTransmitHandlerDpc, Context); 884 } 885 886 887 /** 888 The dummy handler for the dummy IP receive token. 889 890 @param[in] Context The context passed in by the event notifier. 891 892 **/ 893 VOID 894 EFIAPI 895 IpIoDummyHandlerDpc ( 896 IN VOID *Context 897 ) 898 { 899 IP_IO_IP_INFO *IpInfo; 900 EFI_STATUS Status; 901 EFI_EVENT RecycleEvent; 902 903 IpInfo = (IP_IO_IP_INFO *) Context; 904 905 if ((IpInfo->IpVersion != IP_VERSION_4) && (IpInfo->IpVersion != IP_VERSION_6)) { 906 return ; 907 } 908 909 RecycleEvent = NULL; 910 911 if (IpInfo->IpVersion == IP_VERSION_4) { 912 Status = IpInfo->DummyRcvToken.Ip4Token.Status; 913 914 if (IpInfo->DummyRcvToken.Ip4Token.Packet.RxData != NULL) { 915 RecycleEvent = IpInfo->DummyRcvToken.Ip4Token.Packet.RxData->RecycleSignal; 916 } 917 } else { 918 Status = IpInfo->DummyRcvToken.Ip6Token.Status; 919 920 if (IpInfo->DummyRcvToken.Ip6Token.Packet.RxData != NULL) { 921 RecycleEvent = IpInfo->DummyRcvToken.Ip6Token.Packet.RxData->RecycleSignal; 922 } 923 } 924 925 926 927 if (EFI_ABORTED == Status) { 928 // 929 // The reception is actively aborted by the consumer, directly return. 930 // 931 return; 932 } else if (EFI_SUCCESS == Status) { 933 // 934 // Recycle the RxData. 935 // 936 ASSERT (RecycleEvent != NULL); 937 938 gBS->SignalEvent (RecycleEvent); 939 } 940 941 // 942 // Continue the receive. 943 // 944 if (IpInfo->IpVersion == IP_VERSION_4) { 945 IpInfo->Ip.Ip4->Receive ( 946 IpInfo->Ip.Ip4, 947 &IpInfo->DummyRcvToken.Ip4Token 948 ); 949 } else { 950 IpInfo->Ip.Ip6->Receive ( 951 IpInfo->Ip.Ip6, 952 &IpInfo->DummyRcvToken.Ip6Token 953 ); 954 } 955 } 956 957 958 /** 959 This function add IpIoDummyHandlerDpc to the end of the DPC queue. 960 961 @param[in] Event The event signaled. 962 @param[in] Context The context passed in by the event notifier. 963 964 **/ 965 VOID 966 EFIAPI 967 IpIoDummyHandler ( 968 IN EFI_EVENT Event, 969 IN VOID *Context 970 ) 971 { 972 // 973 // Request IpIoDummyHandlerDpc as a DPC at TPL_CALLBACK 974 // 975 QueueDpc (TPL_CALLBACK, IpIoDummyHandlerDpc, Context); 976 } 977 978 979 /** 980 Notify function for the IP receive token, used to process 981 the received IP packets. 982 983 @param[in] Context The context passed in by the event notifier. 984 985 **/ 986 VOID 987 EFIAPI 988 IpIoListenHandlerDpc ( 989 IN VOID *Context 990 ) 991 { 992 IP_IO *IpIo; 993 EFI_STATUS Status; 994 IP_IO_IP_RX_DATA *RxData; 995 EFI_NET_SESSION_DATA Session; 996 NET_BUF *Pkt; 997 998 IpIo = (IP_IO *) Context; 999 1000 if (IpIo->IpVersion == IP_VERSION_4) { 1001 Status = IpIo->RcvToken.Ip4Token.Status; 1002 RxData = (IP_IO_IP_RX_DATA *) IpIo->RcvToken.Ip4Token.Packet.RxData; 1003 } else if (IpIo->IpVersion == IP_VERSION_6) { 1004 Status = IpIo->RcvToken.Ip6Token.Status; 1005 RxData = (IP_IO_IP_RX_DATA *) IpIo->RcvToken.Ip6Token.Packet.RxData; 1006 } else { 1007 return; 1008 } 1009 1010 if (EFI_ABORTED == Status) { 1011 // 1012 // The reception is actively aborted by the consumer, directly return. 1013 // 1014 return; 1015 } 1016 1017 if (((EFI_SUCCESS != Status) && (EFI_ICMP_ERROR != Status)) || (NULL == RxData)) { 1018 // 1019 // @bug Only process the normal packets and the icmp error packets, if RxData is NULL 1020 // @bug with Status == EFI_SUCCESS or EFI_ICMP_ERROR, just resume the receive although 1021 // @bug this should be a bug of the low layer (IP). 1022 // 1023 goto Resume; 1024 } 1025 1026 if (NULL == IpIo->PktRcvdNotify) { 1027 goto CleanUp; 1028 } 1029 1030 if (IpIo->IpVersion == IP_VERSION_4) { 1031 if ((EFI_IP4 (RxData->Ip4RxData.Header->SourceAddress) != 0) && 1032 !NetIp4IsUnicast (EFI_NTOHL (((EFI_IP4_RECEIVE_DATA *) RxData)->Header->SourceAddress), 0)) { 1033 // 1034 // The source address is not zero and it's not a unicast IP address, discard it. 1035 // 1036 goto CleanUp; 1037 } 1038 1039 // 1040 // Create a netbuffer representing IPv4 packet 1041 // 1042 Pkt = NetbufFromExt ( 1043 (NET_FRAGMENT *) RxData->Ip4RxData.FragmentTable, 1044 RxData->Ip4RxData.FragmentCount, 1045 0, 1046 0, 1047 IpIoExtFree, 1048 RxData->Ip4RxData.RecycleSignal 1049 ); 1050 if (NULL == Pkt) { 1051 goto CleanUp; 1052 } 1053 1054 // 1055 // Create a net session 1056 // 1057 Session.Source.Addr[0] = EFI_IP4 (RxData->Ip4RxData.Header->SourceAddress); 1058 Session.Dest.Addr[0] = EFI_IP4 (RxData->Ip4RxData.Header->DestinationAddress); 1059 Session.IpHdr.Ip4Hdr = RxData->Ip4RxData.Header; 1060 Session.IpHdrLen = RxData->Ip4RxData.HeaderLength; 1061 Session.IpVersion = IP_VERSION_4; 1062 } else { 1063 1064 if (!NetIp6IsValidUnicast(&RxData->Ip6RxData.Header->SourceAddress)) { 1065 goto CleanUp; 1066 } 1067 1068 // 1069 // Create a netbuffer representing IPv6 packet 1070 // 1071 Pkt = NetbufFromExt ( 1072 (NET_FRAGMENT *) RxData->Ip6RxData.FragmentTable, 1073 RxData->Ip6RxData.FragmentCount, 1074 0, 1075 0, 1076 IpIoExtFree, 1077 RxData->Ip6RxData.RecycleSignal 1078 ); 1079 if (NULL == Pkt) { 1080 goto CleanUp; 1081 } 1082 1083 // 1084 // Create a net session 1085 // 1086 CopyMem ( 1087 &Session.Source, 1088 &RxData->Ip6RxData.Header->SourceAddress, 1089 sizeof(EFI_IPv6_ADDRESS) 1090 ); 1091 CopyMem ( 1092 &Session.Dest, 1093 &RxData->Ip6RxData.Header->DestinationAddress, 1094 sizeof(EFI_IPv6_ADDRESS) 1095 ); 1096 Session.IpHdr.Ip6Hdr = RxData->Ip6RxData.Header; 1097 Session.IpHdrLen = RxData->Ip6RxData.HeaderLength; 1098 Session.IpVersion = IP_VERSION_6; 1099 } 1100 1101 if (EFI_SUCCESS == Status) { 1102 1103 IpIo->PktRcvdNotify (EFI_SUCCESS, 0, &Session, Pkt, IpIo->RcvdContext); 1104 } else { 1105 // 1106 // Status is EFI_ICMP_ERROR 1107 // 1108 Status = IpIoIcmpHandler (IpIo, Pkt, &Session); 1109 if (EFI_ERROR (Status)) { 1110 NetbufFree (Pkt); 1111 } 1112 } 1113 1114 goto Resume; 1115 1116 CleanUp: 1117 1118 if (IpIo->IpVersion == IP_VERSION_4){ 1119 gBS->SignalEvent (RxData->Ip4RxData.RecycleSignal); 1120 } else { 1121 gBS->SignalEvent (RxData->Ip6RxData.RecycleSignal); 1122 } 1123 1124 Resume: 1125 1126 if (IpIo->IpVersion == IP_VERSION_4){ 1127 IpIo->Ip.Ip4->Receive (IpIo->Ip.Ip4, &(IpIo->RcvToken.Ip4Token)); 1128 } else { 1129 IpIo->Ip.Ip6->Receive (IpIo->Ip.Ip6, &(IpIo->RcvToken.Ip6Token)); 1130 } 1131 } 1132 1133 /** 1134 This function add IpIoListenHandlerDpc to the end of the DPC queue. 1135 1136 @param[in] Event The event signaled. 1137 @param[in] Context The context passed in by the event notifier. 1138 1139 **/ 1140 VOID 1141 EFIAPI 1142 IpIoListenHandler ( 1143 IN EFI_EVENT Event, 1144 IN VOID *Context 1145 ) 1146 { 1147 // 1148 // Request IpIoListenHandlerDpc as a DPC at TPL_CALLBACK 1149 // 1150 QueueDpc (TPL_CALLBACK, IpIoListenHandlerDpc, Context); 1151 } 1152 1153 1154 /** 1155 Create a new IP_IO instance. 1156 1157 This function uses IP4/IP6 service binding protocol in Controller to create 1158 an IP4/IP6 child (aka IP4/IP6 instance). 1159 1160 @param[in] Image The image handle of the driver or application that 1161 consumes IP_IO. 1162 @param[in] Controller The controller handle that has IP4 or IP6 service 1163 binding protocol installed. 1164 @param[in] IpVersion The version of the IP protocol to use, either 1165 IPv4 or IPv6. 1166 1167 @return Pointer to a newly created IP_IO instance, or NULL if failed. 1168 1169 **/ 1170 IP_IO * 1171 EFIAPI 1172 IpIoCreate ( 1173 IN EFI_HANDLE Image, 1174 IN EFI_HANDLE Controller, 1175 IN UINT8 IpVersion 1176 ) 1177 { 1178 EFI_STATUS Status; 1179 IP_IO *IpIo; 1180 EFI_EVENT Event; 1181 1182 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1183 1184 IpIo = AllocateZeroPool (sizeof (IP_IO)); 1185 if (NULL == IpIo) { 1186 return NULL; 1187 } 1188 1189 InitializeListHead (&(IpIo->PendingSndList)); 1190 InitializeListHead (&(IpIo->IpList)); 1191 IpIo->Controller = Controller; 1192 IpIo->Image = Image; 1193 IpIo->IpVersion = IpVersion; 1194 Event = NULL; 1195 1196 Status = gBS->CreateEvent ( 1197 EVT_NOTIFY_SIGNAL, 1198 TPL_NOTIFY, 1199 IpIoListenHandler, 1200 IpIo, 1201 &Event 1202 ); 1203 if (EFI_ERROR (Status)) { 1204 goto ReleaseIpIo; 1205 } 1206 1207 if (IpVersion == IP_VERSION_4) { 1208 IpIo->RcvToken.Ip4Token.Event = Event; 1209 } else { 1210 IpIo->RcvToken.Ip6Token.Event = Event; 1211 } 1212 1213 // 1214 // Create an IP child and open IP protocol 1215 // 1216 Status = IpIoCreateIpChildOpenProtocol ( 1217 Controller, 1218 Image, 1219 &IpIo->ChildHandle, 1220 IpVersion, 1221 (VOID **)&(IpIo->Ip) 1222 ); 1223 if (EFI_ERROR (Status)) { 1224 goto ReleaseIpIo; 1225 } 1226 1227 return IpIo; 1228 1229 ReleaseIpIo: 1230 1231 if (Event != NULL) { 1232 gBS->CloseEvent (Event); 1233 } 1234 1235 gBS->FreePool (IpIo); 1236 1237 return NULL; 1238 } 1239 1240 1241 /** 1242 Open an IP_IO instance for use. 1243 1244 This function is called after IpIoCreate(). It is used for configuring the IP 1245 instance and register the callbacks and their context data for sending and 1246 receiving IP packets. 1247 1248 @param[in, out] IpIo Pointer to an IP_IO instance that needs 1249 to open. 1250 @param[in] OpenData The configuration data and callbacks for 1251 the IP_IO instance. 1252 1253 @retval EFI_SUCCESS The IP_IO instance opened with OpenData 1254 successfully. 1255 @retval EFI_ACCESS_DENIED The IP_IO instance is configured, avoid to 1256 reopen it. 1257 @retval Others Error condition occurred. 1258 1259 **/ 1260 EFI_STATUS 1261 EFIAPI 1262 IpIoOpen ( 1263 IN OUT IP_IO *IpIo, 1264 IN IP_IO_OPEN_DATA *OpenData 1265 ) 1266 { 1267 EFI_STATUS Status; 1268 UINT8 IpVersion; 1269 1270 if (IpIo->IsConfigured) { 1271 return EFI_ACCESS_DENIED; 1272 } 1273 1274 IpVersion = IpIo->IpVersion; 1275 1276 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1277 1278 // 1279 // configure ip 1280 // 1281 if (IpVersion == IP_VERSION_4){ 1282 Status = IpIo->Ip.Ip4->Configure ( 1283 IpIo->Ip.Ip4, 1284 &OpenData->IpConfigData.Ip4CfgData 1285 ); 1286 } else { 1287 1288 Status = IpIo->Ip.Ip6->Configure ( 1289 IpIo->Ip.Ip6, 1290 &OpenData->IpConfigData.Ip6CfgData 1291 ); 1292 } 1293 1294 if (EFI_ERROR (Status)) { 1295 return Status; 1296 } 1297 1298 // 1299 // @bug To delete the default route entry in this Ip, if it is: 1300 // @bug (0.0.0.0, 0.0.0.0, 0.0.0.0). Delete this statement if Ip modified 1301 // @bug its code 1302 // 1303 if (IpVersion == IP_VERSION_4){ 1304 Status = IpIo->Ip.Ip4->Routes ( 1305 IpIo->Ip.Ip4, 1306 TRUE, 1307 &mZeroIp4Addr, 1308 &mZeroIp4Addr, 1309 &mZeroIp4Addr 1310 ); 1311 1312 if (EFI_ERROR (Status) && (EFI_NOT_FOUND != Status)) { 1313 return Status; 1314 } 1315 } 1316 1317 IpIo->PktRcvdNotify = OpenData->PktRcvdNotify; 1318 IpIo->PktSentNotify = OpenData->PktSentNotify; 1319 1320 IpIo->RcvdContext = OpenData->RcvdContext; 1321 IpIo->SndContext = OpenData->SndContext; 1322 1323 if (IpVersion == IP_VERSION_4){ 1324 IpIo->Protocol = OpenData->IpConfigData.Ip4CfgData.DefaultProtocol; 1325 1326 // 1327 // start to listen incoming packet 1328 // 1329 Status = IpIo->Ip.Ip4->Receive ( 1330 IpIo->Ip.Ip4, 1331 &(IpIo->RcvToken.Ip4Token) 1332 ); 1333 if (EFI_ERROR (Status)) { 1334 IpIo->Ip.Ip4->Configure (IpIo->Ip.Ip4, NULL); 1335 goto ErrorExit; 1336 } 1337 1338 } else { 1339 1340 IpIo->Protocol = OpenData->IpConfigData.Ip6CfgData.DefaultProtocol; 1341 Status = IpIo->Ip.Ip6->Receive ( 1342 IpIo->Ip.Ip6, 1343 &(IpIo->RcvToken.Ip6Token) 1344 ); 1345 if (EFI_ERROR (Status)) { 1346 IpIo->Ip.Ip6->Configure (IpIo->Ip.Ip6, NULL); 1347 goto ErrorExit; 1348 } 1349 } 1350 1351 IpIo->IsConfigured = TRUE; 1352 InsertTailList (&mActiveIpIoList, &IpIo->Entry); 1353 1354 ErrorExit: 1355 1356 return Status; 1357 } 1358 1359 1360 /** 1361 Stop an IP_IO instance. 1362 1363 This function is paired with IpIoOpen(). The IP_IO will be unconfigured and all 1364 the pending send/receive tokens will be canceled. 1365 1366 @param[in, out] IpIo Pointer to the IP_IO instance that needs to stop. 1367 1368 @retval EFI_SUCCESS The IP_IO instance stopped successfully. 1369 @retval Others Error condition occurred. 1370 1371 **/ 1372 EFI_STATUS 1373 EFIAPI 1374 IpIoStop ( 1375 IN OUT IP_IO *IpIo 1376 ) 1377 { 1378 EFI_STATUS Status; 1379 IP_IO_IP_INFO *IpInfo; 1380 UINT8 IpVersion; 1381 1382 if (!IpIo->IsConfigured) { 1383 return EFI_SUCCESS; 1384 } 1385 1386 IpVersion = IpIo->IpVersion; 1387 1388 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1389 1390 // 1391 // Remove the IpIo from the active IpIo list. 1392 // 1393 RemoveEntryList (&IpIo->Entry); 1394 1395 // 1396 // Configure NULL Ip 1397 // 1398 if (IpVersion == IP_VERSION_4) { 1399 Status = IpIo->Ip.Ip4->Configure (IpIo->Ip.Ip4, NULL); 1400 } else { 1401 Status = IpIo->Ip.Ip6->Configure (IpIo->Ip.Ip6, NULL); 1402 } 1403 if (EFI_ERROR (Status)) { 1404 return Status; 1405 } 1406 1407 IpIo->IsConfigured = FALSE; 1408 1409 // 1410 // Detroy the Ip List used by IpIo 1411 // 1412 1413 while (!IsListEmpty (&(IpIo->IpList))) { 1414 IpInfo = NET_LIST_HEAD (&(IpIo->IpList), IP_IO_IP_INFO, Entry); 1415 1416 IpIoRemoveIp (IpIo, IpInfo); 1417 } 1418 1419 // 1420 // All pending send tokens should be flushed by reseting the IP instances. 1421 // 1422 ASSERT (IsListEmpty (&IpIo->PendingSndList)); 1423 1424 // 1425 // Close the receive event. 1426 // 1427 if (IpVersion == IP_VERSION_4){ 1428 gBS->CloseEvent (IpIo->RcvToken.Ip4Token.Event); 1429 } else { 1430 gBS->CloseEvent (IpIo->RcvToken.Ip6Token.Event); 1431 } 1432 1433 return EFI_SUCCESS; 1434 } 1435 1436 1437 /** 1438 Destroy an IP_IO instance. 1439 1440 This function is paired with IpIoCreate(). The IP_IO will be closed first. 1441 Resource will be freed afterwards. See IpIoCloseProtocolDestroyIpChild(). 1442 1443 @param[in, out] IpIo Pointer to the IP_IO instance that needs to be 1444 destroyed. 1445 1446 @retval EFI_SUCCESS The IP_IO instance destroyed successfully. 1447 @retval Others Error condition occurred. 1448 1449 **/ 1450 EFI_STATUS 1451 EFIAPI 1452 IpIoDestroy ( 1453 IN OUT IP_IO *IpIo 1454 ) 1455 { 1456 // 1457 // Stop the IpIo. 1458 // 1459 IpIoStop (IpIo); 1460 1461 // 1462 // Close the IP protocol and destroy the child. 1463 // 1464 IpIoCloseProtocolDestroyIpChild ( 1465 IpIo->Controller, 1466 IpIo->Image, 1467 IpIo->ChildHandle, 1468 IpIo->IpVersion 1469 ); 1470 1471 gBS->FreePool (IpIo); 1472 1473 return EFI_SUCCESS; 1474 } 1475 1476 1477 /** 1478 Send out an IP packet. 1479 1480 This function is called after IpIoOpen(). The data to be sent are wrapped in 1481 Pkt. The IP instance wrapped in IpIo is used for sending by default but can be 1482 overriden by Sender. Other sending configs, like source address and gateway 1483 address etc., are specified in OverrideData. 1484 1485 @param[in, out] IpIo Pointer to an IP_IO instance used for sending IP 1486 packet. 1487 @param[in, out] Pkt Pointer to the IP packet to be sent. 1488 @param[in] Sender The IP protocol instance used for sending. 1489 @param[in] Context Optional context data. 1490 @param[in] NotifyData Optional notify data. 1491 @param[in] Dest The destination IP address to send this packet to. 1492 @param[in] OverrideData The data to override some configuration of the IP 1493 instance used for sending. 1494 1495 @retval EFI_SUCCESS The operation is completed successfully. 1496 @retval EFI_NOT_STARTED The IpIo is not configured. 1497 @retval EFI_OUT_OF_RESOURCES Failed due to resource limit. 1498 1499 **/ 1500 EFI_STATUS 1501 EFIAPI 1502 IpIoSend ( 1503 IN OUT IP_IO *IpIo, 1504 IN OUT NET_BUF *Pkt, 1505 IN IP_IO_IP_INFO *Sender OPTIONAL, 1506 IN VOID *Context OPTIONAL, 1507 IN VOID *NotifyData OPTIONAL, 1508 IN EFI_IP_ADDRESS *Dest, 1509 IN IP_IO_OVERRIDE *OverrideData OPTIONAL 1510 ) 1511 { 1512 EFI_STATUS Status; 1513 IP_IO_IP_PROTOCOL Ip; 1514 IP_IO_SEND_ENTRY *SndEntry; 1515 1516 ASSERT ((IpIo->IpVersion != IP_VERSION_4) || (Dest != NULL)); 1517 1518 if (!IpIo->IsConfigured) { 1519 return EFI_NOT_STARTED; 1520 } 1521 1522 Ip = (NULL == Sender) ? IpIo->Ip : Sender->Ip; 1523 1524 // 1525 // create a new SndEntry 1526 // 1527 SndEntry = IpIoCreateSndEntry (IpIo, Pkt, Ip, Context, NotifyData, Dest, OverrideData); 1528 if (NULL == SndEntry) { 1529 return EFI_OUT_OF_RESOURCES; 1530 } 1531 1532 // 1533 // Send this Packet 1534 // 1535 if (IpIo->IpVersion == IP_VERSION_4){ 1536 Status = Ip.Ip4->Transmit ( 1537 Ip.Ip4, 1538 &SndEntry->SndToken.Ip4Token 1539 ); 1540 } else { 1541 Status = Ip.Ip6->Transmit ( 1542 Ip.Ip6, 1543 &SndEntry->SndToken.Ip6Token 1544 ); 1545 } 1546 1547 if (EFI_ERROR (Status)) { 1548 IpIoDestroySndEntry (SndEntry); 1549 } 1550 1551 return Status; 1552 } 1553 1554 1555 /** 1556 Cancel the IP transmit token which wraps this Packet. 1557 1558 @param[in] IpIo Pointer to the IP_IO instance. 1559 @param[in] Packet Pointer to the packet of NET_BUF to cancel. 1560 1561 **/ 1562 VOID 1563 EFIAPI 1564 IpIoCancelTxToken ( 1565 IN IP_IO *IpIo, 1566 IN VOID *Packet 1567 ) 1568 { 1569 LIST_ENTRY *Node; 1570 IP_IO_SEND_ENTRY *SndEntry; 1571 IP_IO_IP_PROTOCOL Ip; 1572 1573 ASSERT ((IpIo != NULL) && (Packet != NULL)); 1574 1575 NET_LIST_FOR_EACH (Node, &IpIo->PendingSndList) { 1576 1577 SndEntry = NET_LIST_USER_STRUCT (Node, IP_IO_SEND_ENTRY, Entry); 1578 1579 if (SndEntry->Pkt == Packet) { 1580 1581 Ip = SndEntry->Ip; 1582 1583 if (IpIo->IpVersion == IP_VERSION_4) { 1584 Ip.Ip4->Cancel ( 1585 Ip.Ip4, 1586 &SndEntry->SndToken.Ip4Token 1587 ); 1588 } else { 1589 Ip.Ip6->Cancel ( 1590 Ip.Ip6, 1591 &SndEntry->SndToken.Ip6Token 1592 ); 1593 } 1594 1595 break; 1596 } 1597 } 1598 1599 } 1600 1601 1602 /** 1603 Add a new IP instance for sending data. 1604 1605 The function is used to add the IP_IO to the IP_IO sending list. The caller 1606 can later use IpIoFindSender() to get the IP_IO and call IpIoSend() to send 1607 data. 1608 1609 @param[in, out] IpIo Pointer to a IP_IO instance to add a new IP 1610 instance for sending purpose. 1611 1612 @return Pointer to the created IP_IO_IP_INFO structure, NULL if failed. 1613 1614 **/ 1615 IP_IO_IP_INFO * 1616 EFIAPI 1617 IpIoAddIp ( 1618 IN OUT IP_IO *IpIo 1619 ) 1620 { 1621 EFI_STATUS Status; 1622 IP_IO_IP_INFO *IpInfo; 1623 EFI_EVENT Event; 1624 1625 ASSERT (IpIo != NULL); 1626 1627 IpInfo = AllocatePool (sizeof (IP_IO_IP_INFO)); 1628 if (IpInfo == NULL) { 1629 return NULL; 1630 } 1631 1632 // 1633 // Init this IpInfo, set the Addr and SubnetMask to 0 before we configure the IP 1634 // instance. 1635 // 1636 InitializeListHead (&IpInfo->Entry); 1637 IpInfo->ChildHandle = NULL; 1638 ZeroMem (&IpInfo->Addr, sizeof (IpInfo->Addr)); 1639 ZeroMem (&IpInfo->PreMask, sizeof (IpInfo->PreMask)); 1640 1641 IpInfo->RefCnt = 1; 1642 IpInfo->IpVersion = IpIo->IpVersion; 1643 1644 // 1645 // Create the IP instance and open the IP protocol. 1646 // 1647 Status = IpIoCreateIpChildOpenProtocol ( 1648 IpIo->Controller, 1649 IpIo->Image, 1650 &IpInfo->ChildHandle, 1651 IpInfo->IpVersion, 1652 (VOID **) &IpInfo->Ip 1653 ); 1654 if (EFI_ERROR (Status)) { 1655 goto ReleaseIpInfo; 1656 } 1657 1658 // 1659 // Create the event for the DummyRcvToken. 1660 // 1661 Status = gBS->CreateEvent ( 1662 EVT_NOTIFY_SIGNAL, 1663 TPL_NOTIFY, 1664 IpIoDummyHandler, 1665 IpInfo, 1666 &Event 1667 ); 1668 if (EFI_ERROR (Status)) { 1669 goto ReleaseIpChild; 1670 } 1671 1672 if (IpInfo->IpVersion == IP_VERSION_4) { 1673 IpInfo->DummyRcvToken.Ip4Token.Event = Event; 1674 } else { 1675 IpInfo->DummyRcvToken.Ip6Token.Event = Event; 1676 } 1677 1678 // 1679 // Link this IpInfo into the IpIo. 1680 // 1681 InsertTailList (&IpIo->IpList, &IpInfo->Entry); 1682 1683 return IpInfo; 1684 1685 ReleaseIpChild: 1686 1687 IpIoCloseProtocolDestroyIpChild ( 1688 IpIo->Controller, 1689 IpIo->Image, 1690 IpInfo->ChildHandle, 1691 IpInfo->IpVersion 1692 ); 1693 1694 ReleaseIpInfo: 1695 1696 gBS->FreePool (IpInfo); 1697 1698 return NULL; 1699 } 1700 1701 1702 /** 1703 Configure the IP instance of this IpInfo and start the receiving if IpConfigData 1704 is not NULL. 1705 1706 @param[in, out] IpInfo Pointer to the IP_IO_IP_INFO instance. 1707 @param[in, out] IpConfigData The IP configure data used to configure the IP 1708 instance, if NULL the IP instance is reset. If 1709 UseDefaultAddress is set to TRUE, and the configure 1710 operation succeeds, the default address information 1711 is written back in this IpConfigData. 1712 1713 @retval EFI_SUCCESS The IP instance of this IpInfo is configured successfully 1714 or no need to reconfigure it. 1715 @retval Others Configuration fails. 1716 1717 **/ 1718 EFI_STATUS 1719 EFIAPI 1720 IpIoConfigIp ( 1721 IN OUT IP_IO_IP_INFO *IpInfo, 1722 IN OUT VOID *IpConfigData OPTIONAL 1723 ) 1724 { 1725 EFI_STATUS Status; 1726 IP_IO_IP_PROTOCOL Ip; 1727 UINT8 IpVersion; 1728 EFI_IP4_MODE_DATA Ip4ModeData; 1729 EFI_IP6_MODE_DATA Ip6ModeData; 1730 1731 ASSERT (IpInfo != NULL); 1732 1733 if (IpInfo->RefCnt > 1) { 1734 // 1735 // This IP instance is shared, don't reconfigure it until it has only one 1736 // consumer. Currently, only the tcp children cloned from their passive parent 1737 // will share the same IP. So this cases only happens while IpConfigData is NULL, 1738 // let the last consumer clean the IP instance. 1739 // 1740 return EFI_SUCCESS; 1741 } 1742 1743 IpVersion = IpInfo->IpVersion; 1744 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1745 1746 Ip = IpInfo->Ip; 1747 1748 if (IpInfo->IpVersion == IP_VERSION_4) { 1749 Status = Ip.Ip4->Configure (Ip.Ip4, IpConfigData); 1750 } else { 1751 Status = Ip.Ip6->Configure (Ip.Ip6, IpConfigData); 1752 } 1753 1754 if (EFI_ERROR (Status)) { 1755 goto OnExit; 1756 } 1757 1758 if (IpConfigData != NULL) { 1759 if (IpInfo->IpVersion == IP_VERSION_4){ 1760 1761 if (((EFI_IP4_CONFIG_DATA *) IpConfigData)->UseDefaultAddress) { 1762 Ip.Ip4->GetModeData ( 1763 Ip.Ip4, 1764 &Ip4ModeData, 1765 NULL, 1766 NULL 1767 ); 1768 1769 IP4_COPY_ADDRESS (&((EFI_IP4_CONFIG_DATA*) IpConfigData)->StationAddress, &Ip4ModeData.ConfigData.StationAddress); 1770 IP4_COPY_ADDRESS (&((EFI_IP4_CONFIG_DATA*) IpConfigData)->SubnetMask, &Ip4ModeData.ConfigData.SubnetMask); 1771 } 1772 1773 CopyMem ( 1774 &IpInfo->Addr.Addr, 1775 &((EFI_IP4_CONFIG_DATA *) IpConfigData)->StationAddress, 1776 sizeof (IP4_ADDR) 1777 ); 1778 CopyMem ( 1779 &IpInfo->PreMask.SubnetMask, 1780 &((EFI_IP4_CONFIG_DATA *) IpConfigData)->SubnetMask, 1781 sizeof (IP4_ADDR) 1782 ); 1783 1784 Status = Ip.Ip4->Receive ( 1785 Ip.Ip4, 1786 &IpInfo->DummyRcvToken.Ip4Token 1787 ); 1788 if (EFI_ERROR (Status)) { 1789 Ip.Ip4->Configure (Ip.Ip4, NULL); 1790 } 1791 } else { 1792 Ip.Ip6->GetModeData ( 1793 Ip.Ip6, 1794 &Ip6ModeData, 1795 NULL, 1796 NULL 1797 ); 1798 1799 if (Ip6ModeData.IsConfigured) { 1800 CopyMem ( 1801 &((EFI_IP6_CONFIG_DATA *) IpConfigData)->StationAddress, 1802 &Ip6ModeData.ConfigData.StationAddress, 1803 sizeof (EFI_IPv6_ADDRESS) 1804 ); 1805 1806 if (Ip6ModeData.AddressList != NULL) { 1807 FreePool (Ip6ModeData.AddressList); 1808 } 1809 1810 if (Ip6ModeData.GroupTable != NULL) { 1811 FreePool (Ip6ModeData.GroupTable); 1812 } 1813 1814 if (Ip6ModeData.RouteTable != NULL) { 1815 FreePool (Ip6ModeData.RouteTable); 1816 } 1817 1818 if (Ip6ModeData.NeighborCache != NULL) { 1819 FreePool (Ip6ModeData.NeighborCache); 1820 } 1821 1822 if (Ip6ModeData.PrefixTable != NULL) { 1823 FreePool (Ip6ModeData.PrefixTable); 1824 } 1825 1826 if (Ip6ModeData.IcmpTypeList != NULL) { 1827 FreePool (Ip6ModeData.IcmpTypeList); 1828 } 1829 1830 } else { 1831 Status = EFI_NO_MAPPING; 1832 goto OnExit; 1833 } 1834 1835 CopyMem ( 1836 &IpInfo->Addr, 1837 &Ip6ModeData.ConfigData.StationAddress, 1838 sizeof (EFI_IPv6_ADDRESS) 1839 ); 1840 1841 Status = Ip.Ip6->Receive ( 1842 Ip.Ip6, 1843 &IpInfo->DummyRcvToken.Ip6Token 1844 ); 1845 if (EFI_ERROR (Status)) { 1846 Ip.Ip6->Configure (Ip.Ip6, NULL); 1847 } 1848 } 1849 } else { 1850 // 1851 // The IP instance is reset, set the stored Addr and SubnetMask to zero. 1852 // 1853 ZeroMem (&IpInfo->Addr, sizeof (IpInfo->Addr)); 1854 ZeroMem (&IpInfo->PreMask, sizeof (IpInfo->PreMask)); 1855 } 1856 1857 OnExit: 1858 1859 return Status; 1860 } 1861 1862 1863 /** 1864 Destroy an IP instance maintained in IpIo->IpList for 1865 sending purpose. 1866 1867 This function pairs with IpIoAddIp(). The IpInfo is previously created by 1868 IpIoAddIp(). The IP_IO_IP_INFO::RefCnt is decremented and the IP instance 1869 will be dstroyed if the RefCnt is zero. 1870 1871 @param[in] IpIo Pointer to the IP_IO instance. 1872 @param[in] IpInfo Pointer to the IpInfo to be removed. 1873 1874 **/ 1875 VOID 1876 EFIAPI 1877 IpIoRemoveIp ( 1878 IN IP_IO *IpIo, 1879 IN IP_IO_IP_INFO *IpInfo 1880 ) 1881 { 1882 1883 UINT8 IpVersion; 1884 1885 ASSERT (IpInfo->RefCnt > 0); 1886 1887 NET_PUT_REF (IpInfo); 1888 1889 if (IpInfo->RefCnt > 0) { 1890 1891 return; 1892 } 1893 1894 IpVersion = IpIo->IpVersion; 1895 1896 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1897 1898 RemoveEntryList (&IpInfo->Entry); 1899 1900 if (IpVersion == IP_VERSION_4){ 1901 IpInfo->Ip.Ip4->Configure ( 1902 IpInfo->Ip.Ip4, 1903 NULL 1904 ); 1905 IpIoCloseProtocolDestroyIpChild ( 1906 IpIo->Controller, 1907 IpIo->Image, 1908 IpInfo->ChildHandle, 1909 IP_VERSION_4 1910 ); 1911 1912 gBS->CloseEvent (IpInfo->DummyRcvToken.Ip4Token.Event); 1913 1914 } else { 1915 1916 IpInfo->Ip.Ip6->Configure ( 1917 IpInfo->Ip.Ip6, 1918 NULL 1919 ); 1920 1921 IpIoCloseProtocolDestroyIpChild ( 1922 IpIo->Controller, 1923 IpIo->Image, 1924 IpInfo->ChildHandle, 1925 IP_VERSION_6 1926 ); 1927 1928 gBS->CloseEvent (IpInfo->DummyRcvToken.Ip6Token.Event); 1929 } 1930 1931 FreePool (IpInfo); 1932 } 1933 1934 1935 /** 1936 Find the first IP protocol maintained in IpIo whose local 1937 address is the same as Src. 1938 1939 This function is called when the caller needs the IpIo to send data to the 1940 specified Src. The IpIo was added previously by IpIoAddIp(). 1941 1942 @param[in, out] IpIo Pointer to the pointer of the IP_IO instance. 1943 @param[in] IpVersion The version of the IP protocol to use, either 1944 IPv4 or IPv6. 1945 @param[in] Src The local IP address. 1946 1947 @return Pointer to the IP protocol can be used for sending purpose and its local 1948 address is the same with Src. 1949 1950 **/ 1951 IP_IO_IP_INFO * 1952 EFIAPI 1953 IpIoFindSender ( 1954 IN OUT IP_IO **IpIo, 1955 IN UINT8 IpVersion, 1956 IN EFI_IP_ADDRESS *Src 1957 ) 1958 { 1959 LIST_ENTRY *IpIoEntry; 1960 IP_IO *IpIoPtr; 1961 LIST_ENTRY *IpInfoEntry; 1962 IP_IO_IP_INFO *IpInfo; 1963 1964 ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6)); 1965 1966 NET_LIST_FOR_EACH (IpIoEntry, &mActiveIpIoList) { 1967 IpIoPtr = NET_LIST_USER_STRUCT (IpIoEntry, IP_IO, Entry); 1968 1969 if (((*IpIo != NULL) && (*IpIo != IpIoPtr)) || (IpIoPtr->IpVersion != IpVersion)) { 1970 continue; 1971 } 1972 1973 NET_LIST_FOR_EACH (IpInfoEntry, &IpIoPtr->IpList) { 1974 IpInfo = NET_LIST_USER_STRUCT (IpInfoEntry, IP_IO_IP_INFO, Entry); 1975 if (IpInfo->IpVersion == IP_VERSION_4){ 1976 1977 if (EFI_IP4_EQUAL (&IpInfo->Addr.v4, &Src->v4)) { 1978 *IpIo = IpIoPtr; 1979 return IpInfo; 1980 } 1981 1982 } else { 1983 1984 if (EFI_IP6_EQUAL (&IpInfo->Addr.v6, &Src->v6)) { 1985 *IpIo = IpIoPtr; 1986 return IpInfo; 1987 } 1988 } 1989 1990 } 1991 } 1992 1993 // 1994 // No match. 1995 // 1996 return NULL; 1997 } 1998 1999 2000 /** 2001 Get the ICMP error map information. 2002 2003 The ErrorStatus will be returned. The IsHard and Notify are optional. If they 2004 are not NULL, this routine will fill them. 2005 2006 @param[in] IcmpError IcmpError Type. 2007 @param[in] IpVersion The version of the IP protocol to use, 2008 either IPv4 or IPv6. 2009 @param[out] IsHard If TRUE, indicates that it is a hard error. 2010 @param[out] Notify If TRUE, SockError needs to be notified. 2011 2012 @return ICMP Error Status, such as EFI_NETWORK_UNREACHABLE. 2013 2014 **/ 2015 EFI_STATUS 2016 EFIAPI 2017 IpIoGetIcmpErrStatus ( 2018 IN UINT8 IcmpError, 2019 IN UINT8 IpVersion, 2020 OUT BOOLEAN *IsHard OPTIONAL, 2021 OUT BOOLEAN *Notify OPTIONAL 2022 ) 2023 { 2024 if (IpVersion == IP_VERSION_4 ) { 2025 ASSERT (IcmpError <= ICMP_ERR_PARAMPROB); 2026 2027 if (IsHard != NULL) { 2028 *IsHard = mIcmpErrMap[IcmpError].IsHard; 2029 } 2030 2031 if (Notify != NULL) { 2032 *Notify = mIcmpErrMap[IcmpError].Notify; 2033 } 2034 2035 switch (IcmpError) { 2036 case ICMP_ERR_UNREACH_NET: 2037 return EFI_NETWORK_UNREACHABLE; 2038 2039 case ICMP_ERR_TIMXCEED_INTRANS: 2040 case ICMP_ERR_TIMXCEED_REASS: 2041 case ICMP_ERR_UNREACH_HOST: 2042 return EFI_HOST_UNREACHABLE; 2043 2044 case ICMP_ERR_UNREACH_PROTOCOL: 2045 return EFI_PROTOCOL_UNREACHABLE; 2046 2047 case ICMP_ERR_UNREACH_PORT: 2048 return EFI_PORT_UNREACHABLE; 2049 2050 case ICMP_ERR_MSGSIZE: 2051 case ICMP_ERR_UNREACH_SRCFAIL: 2052 case ICMP_ERR_QUENCH: 2053 case ICMP_ERR_PARAMPROB: 2054 return EFI_ICMP_ERROR; 2055 2056 default: 2057 ASSERT (FALSE); 2058 return EFI_UNSUPPORTED; 2059 } 2060 2061 } else if (IpVersion == IP_VERSION_6) { 2062 2063 ASSERT (IcmpError <= ICMP6_ERR_PARAMPROB_IPV6OPTION); 2064 2065 if (IsHard != NULL) { 2066 *IsHard = mIcmp6ErrMap[IcmpError].IsHard; 2067 } 2068 2069 if (Notify != NULL) { 2070 *Notify = mIcmp6ErrMap[IcmpError].Notify; 2071 } 2072 2073 switch (IcmpError) { 2074 case ICMP6_ERR_UNREACH_NET: 2075 return EFI_NETWORK_UNREACHABLE; 2076 2077 case ICMP6_ERR_UNREACH_HOST: 2078 case ICMP6_ERR_TIMXCEED_HOPLIMIT: 2079 case ICMP6_ERR_TIMXCEED_REASS: 2080 return EFI_HOST_UNREACHABLE; 2081 2082 case ICMP6_ERR_UNREACH_PROTOCOL: 2083 return EFI_PROTOCOL_UNREACHABLE; 2084 2085 case ICMP6_ERR_UNREACH_PORT: 2086 return EFI_PORT_UNREACHABLE; 2087 2088 case ICMP6_ERR_PACKAGE_TOOBIG: 2089 case ICMP6_ERR_PARAMPROB_HEADER: 2090 case ICMP6_ERR_PARAMPROB_NEXHEADER: 2091 case ICMP6_ERR_PARAMPROB_IPV6OPTION: 2092 return EFI_ICMP_ERROR; 2093 2094 default: 2095 ASSERT (FALSE); 2096 return EFI_UNSUPPORTED; 2097 } 2098 2099 } else { 2100 // 2101 // Should never be here 2102 // 2103 ASSERT (FALSE); 2104 return EFI_UNSUPPORTED; 2105 } 2106 } 2107 2108 2109 /** 2110 Refresh the remote peer's Neighbor Cache entries. 2111 2112 This function is called when the caller needs the IpIo to refresh the existing 2113 IPv6 neighbor cache entries since the neighbor is considered reachable by the 2114 node has recently received a confirmation that packets sent recently to the 2115 neighbor were received by its IP layer. 2116 2117 @param[in] IpIo Pointer to an IP_IO instance 2118 @param[in] Neighbor The IP address of the neighbor 2119 @param[in] Timeout Time in 100-ns units that this entry will 2120 remain in the neighbor cache. A value of 2121 zero means that the entry is permanent. 2122 A value of non-zero means that the entry is 2123 dynamic and will be deleted after Timeout. 2124 2125 @retval EFI_SUCCESS The operation is completed successfully. 2126 @retval EFI_NOT_STARTED The IpIo is not configured. 2127 @retval EFI_INVALID_PARAMETER Neighbor Address is invalid. 2128 @retval EFI_NOT_FOUND The neighbor cache entry is not in the 2129 neighbor table. 2130 @retval EFI_OUT_OF_RESOURCES Failed due to resource limit. 2131 2132 **/ 2133 EFI_STATUS 2134 IpIoRefreshNeighbor ( 2135 IN IP_IO *IpIo, 2136 IN EFI_IP_ADDRESS *Neighbor, 2137 IN UINT32 Timeout 2138 ) 2139 { 2140 EFI_IP6_PROTOCOL *Ip; 2141 2142 if (!IpIo->IsConfigured || IpIo->IpVersion != IP_VERSION_6) { 2143 return EFI_NOT_STARTED; 2144 } 2145 2146 Ip = IpIo->Ip.Ip6; 2147 2148 return Ip->Neighbors (Ip, FALSE, &Neighbor->v6, NULL, Timeout, TRUE); 2149 } 2150 2151