github.com/metacubex/gvisor@v0.0.0-20240320004321-933faba989ec/pkg/tcpip/network/ipv6/ndp.go (about) 1 // Copyright 2019 The gVisor Authors. 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package ipv6 16 17 import ( 18 "fmt" 19 "time" 20 21 "github.com/metacubex/gvisor/pkg/buffer" 22 "github.com/metacubex/gvisor/pkg/sync" 23 "github.com/metacubex/gvisor/pkg/tcpip" 24 "github.com/metacubex/gvisor/pkg/tcpip/header" 25 "github.com/metacubex/gvisor/pkg/tcpip/network/internal/ip" 26 "github.com/metacubex/gvisor/pkg/tcpip/stack" 27 ) 28 29 const ( 30 // defaultMaxRtrSolicitations is the default number of Router 31 // Solicitation messages to send when an IPv6 endpoint becomes enabled. 32 // 33 // Default = 3 (from RFC 4861 section 10). 34 defaultMaxRtrSolicitations = 3 35 36 // defaultRtrSolicitationInterval is the default amount of time between 37 // sending Router Solicitation messages. 38 // 39 // Default = 4s (from 4861 section 10). 40 defaultRtrSolicitationInterval = 4 * time.Second 41 42 // defaultMaxRtrSolicitationDelay is the default maximum amount of time 43 // to wait before sending the first Router Solicitation message. 44 // 45 // Default = 1s (from 4861 section 10). 46 defaultMaxRtrSolicitationDelay = time.Second 47 48 // defaultHandleRAs is the default configuration for whether or not to 49 // handle incoming Router Advertisements as a host. 50 defaultHandleRAs = HandlingRAsEnabledWhenForwardingDisabled 51 52 // defaultDiscoverDefaultRouters is the default configuration for 53 // whether or not to discover default routers from incoming Router 54 // Advertisements, as a host. 55 defaultDiscoverDefaultRouters = true 56 57 // defaultDiscoverMoreSpecificRoutes is the default configuration for 58 // whether or not to discover more-specific routes from incoming Router 59 // Advertisements, as a host. 60 defaultDiscoverMoreSpecificRoutes = true 61 62 // defaultDiscoverOnLinkPrefixes is the default configuration for 63 // whether or not to discover on-link prefixes from incoming Router 64 // Advertisements' Prefix Information option, as a host. 65 defaultDiscoverOnLinkPrefixes = true 66 67 // defaultAutoGenGlobalAddresses is the default configuration for 68 // whether or not to generate global IPv6 addresses in response to 69 // receiving a new Prefix Information option with its Autonomous 70 // Address AutoConfiguration flag set, as a host. 71 // 72 // Default = true. 73 defaultAutoGenGlobalAddresses = true 74 75 // minimumRtrSolicitationInterval is the minimum amount of time to wait 76 // between sending Router Solicitation messages. This limit is imposed 77 // to make sure that Router Solicitation messages are not sent all at 78 // once, defeating the purpose of sending the initial few messages. 79 minimumRtrSolicitationInterval = 500 * time.Millisecond 80 81 // minimumMaxRtrSolicitationDelay is the minimum amount of time to wait 82 // before sending the first Router Solicitation message. It is 0 because 83 // we cannot have a negative delay. 84 minimumMaxRtrSolicitationDelay = 0 85 86 // MaxDiscoveredOffLinkRoutes is the maximum number of discovered off-link 87 // routes. The stack should stop discovering new off-link routes after 88 // this limit is reached. 89 // 90 // This value MUST be at minimum 2 as per RFC 4861 section 6.3.4, and 91 // SHOULD be more. 92 MaxDiscoveredOffLinkRoutes = 10 93 94 // MaxDiscoveredOnLinkPrefixes is the maximum number of discovered 95 // on-link prefixes. The stack should stop discovering new on-link 96 // prefixes after discovering MaxDiscoveredOnLinkPrefixes on-link 97 // prefixes. 98 MaxDiscoveredOnLinkPrefixes = 10 99 100 // MaxDiscoveredSLAACPrefixes is the maximum number of discovered 101 // SLAAC prefixes. The stack will stop discovering new SLAAC 102 // prefixes after discovering MaxDiscoveredSLAACPrefixes SLAAC prefixes. 103 MaxDiscoveredSLAACPrefixes = 10 104 105 // validPrefixLenForAutoGen is the expected prefix length that an 106 // address can be generated for. Must be 64 bits as the interface 107 // identifier (IID) is 64 bits and an IPv6 address is 128 bits, so 108 // 128 - 64 = 64. 109 validPrefixLenForAutoGen = 64 110 111 // defaultAutoGenTempGlobalAddresses is the default configuration for whether 112 // or not to generate temporary SLAAC addresses. 113 defaultAutoGenTempGlobalAddresses = true 114 115 // defaultMaxTempAddrValidLifetime is the default maximum valid lifetime 116 // for temporary SLAAC addresses generated as part of RFC 4941. 117 // 118 // Default = 7 days (from RFC 4941 section 5). 119 defaultMaxTempAddrValidLifetime = 7 * 24 * time.Hour 120 121 // defaultMaxTempAddrPreferredLifetime is the default preferred lifetime 122 // for temporary SLAAC addresses generated as part of RFC 4941. 123 // 124 // Default = 1 day (from RFC 4941 section 5). 125 defaultMaxTempAddrPreferredLifetime = 24 * time.Hour 126 127 // defaultRegenAdvanceDuration is the default duration before the deprecation 128 // of a temporary address when a new address will be generated. 129 // 130 // Default = 5s (from RFC 4941 section 5). 131 defaultRegenAdvanceDuration = 5 * time.Second 132 133 // minRegenAdvanceDuration is the minimum duration before the deprecation 134 // of a temporary address when a new address will be generated. 135 minRegenAdvanceDuration = time.Duration(0) 136 137 // maxSLAACAddrLocalRegenAttempts is the maximum number of times to attempt 138 // SLAAC address regenerations in response to an IPv6 endpoint-local conflict. 139 maxSLAACAddrLocalRegenAttempts = 10 140 141 // MinPrefixInformationValidLifetimeForUpdate is the minimum Valid 142 // Lifetime to update the valid lifetime of a generated address by 143 // SLAAC. 144 // 145 // Min = 2hrs. 146 MinPrefixInformationValidLifetimeForUpdate = 2 * time.Hour 147 148 // MaxDesyncFactor is the upper bound for the preferred lifetime's desync 149 // factor for temporary SLAAC addresses. 150 // 151 // Must be greater than 0. 152 // 153 // Max = 10m (from RFC 4941 section 5). 154 MaxDesyncFactor = 10 * time.Minute 155 156 // MinMaxTempAddrPreferredLifetime is the minimum value allowed for the 157 // maximum preferred lifetime for temporary SLAAC addresses. 158 // 159 // This value guarantees that a temporary address is preferred for at 160 // least 1hr if the SLAAC prefix is valid for at least that time. 161 MinMaxTempAddrPreferredLifetime = defaultRegenAdvanceDuration + MaxDesyncFactor + time.Hour 162 163 // MinMaxTempAddrValidLifetime is the minimum value allowed for the 164 // maximum valid lifetime for temporary SLAAC addresses. 165 // 166 // This value guarantees that a temporary address is valid for at least 167 // 2hrs if the SLAAC prefix is valid for at least that time. 168 MinMaxTempAddrValidLifetime = 2 * time.Hour 169 ) 170 171 // NDPEndpoint is an endpoint that supports NDP. 172 type NDPEndpoint interface { 173 // SetNDPConfigurations sets the NDP configurations. 174 SetNDPConfigurations(NDPConfigurations) 175 } 176 177 // DHCPv6ConfigurationFromNDPRA is a configuration available via DHCPv6 that an 178 // NDP Router Advertisement informed the Stack about. 179 type DHCPv6ConfigurationFromNDPRA int 180 181 const ( 182 _ DHCPv6ConfigurationFromNDPRA = iota 183 184 // DHCPv6NoConfiguration indicates that no configurations are available via 185 // DHCPv6. 186 DHCPv6NoConfiguration 187 188 // DHCPv6ManagedAddress indicates that addresses are available via DHCPv6. 189 // 190 // DHCPv6ManagedAddress also implies DHCPv6OtherConfigurations because DHCPv6 191 // returns all available configuration information when serving addresses. 192 DHCPv6ManagedAddress 193 194 // DHCPv6OtherConfigurations indicates that other configuration information is 195 // available via DHCPv6. 196 // 197 // Other configurations are configurations other than addresses. Examples of 198 // other configurations are recursive DNS server list, DNS search lists and 199 // default gateway. 200 DHCPv6OtherConfigurations 201 ) 202 203 // NDPDispatcher is the interface integrators of netstack must implement to 204 // receive and handle NDP related events. 205 type NDPDispatcher interface { 206 // OnDuplicateAddressDetectionResult is called when the DAD process for an 207 // address on a NIC completes. 208 // 209 // This function is not permitted to block indefinitely. This function 210 // is also not permitted to call into the stack. 211 OnDuplicateAddressDetectionResult(tcpip.NICID, tcpip.Address, stack.DADResult) 212 213 // OnOffLinkRouteUpdated is called when an off-link route is updated. 214 // 215 // This function is not permitted to block indefinitely. This function 216 // is also not permitted to call into the stack. 217 OnOffLinkRouteUpdated(tcpip.NICID, tcpip.Subnet, tcpip.Address, header.NDPRoutePreference) 218 219 // OnOffLinkRouteInvalidated is called when an off-link route is invalidated. 220 // 221 // This function is not permitted to block indefinitely. This function 222 // is also not permitted to call into the stack. 223 OnOffLinkRouteInvalidated(tcpip.NICID, tcpip.Subnet, tcpip.Address) 224 225 // OnOnLinkPrefixDiscovered is called when a new on-link prefix is discovered. 226 // 227 // This function is not permitted to block indefinitely. This function 228 // is also not permitted to call into the stack. 229 OnOnLinkPrefixDiscovered(tcpip.NICID, tcpip.Subnet) 230 231 // OnOnLinkPrefixInvalidated is called when a discovered on-link prefix that 232 // was remembered is invalidated. 233 // 234 // This function is not permitted to block indefinitely. This function 235 // is also not permitted to call into the stack. 236 OnOnLinkPrefixInvalidated(tcpip.NICID, tcpip.Subnet) 237 238 // OnAutoGenAddress is called when a new prefix with its autonomous address- 239 // configuration flag set is received and SLAAC was performed. 240 // 241 // This function is not permitted to block indefinitely. It must not 242 // call functions on the stack itself. 243 // 244 // If a non-nil AddressDispatcher is returned, events related to the address 245 // will be sent to the dispatcher. 246 OnAutoGenAddress(tcpip.NICID, tcpip.AddressWithPrefix) stack.AddressDispatcher 247 248 // OnAutoGenAddressDeprecated is called when an auto-generated address (SLAAC) 249 // is deprecated, but is still considered valid. Note, if an address is 250 // invalidated at the same time it is deprecated, the deprecation event may 251 // not be received. 252 // 253 // This function is not permitted to block indefinitely. It must not 254 // call functions on the stack itself. 255 OnAutoGenAddressDeprecated(tcpip.NICID, tcpip.AddressWithPrefix) 256 257 // OnAutoGenAddressInvalidated is called when an auto-generated address 258 // (SLAAC) is invalidated. 259 // 260 // This function is not permitted to block indefinitely. It must not 261 // call functions on the stack itself. 262 OnAutoGenAddressInvalidated(tcpip.NICID, tcpip.AddressWithPrefix) 263 264 // OnRecursiveDNSServerOption is called when the stack learns of DNS servers 265 // through NDP. Note, the addresses may contain link-local addresses. 266 // 267 // It is up to the caller to use the DNS Servers only for their valid 268 // lifetime. OnRecursiveDNSServerOption may be called for new or 269 // already known DNS servers. If called with known DNS servers, their 270 // valid lifetimes must be refreshed to the lifetime (it may be increased, 271 // decreased, or completely invalidated when the lifetime = 0). 272 // 273 // This function is not permitted to block indefinitely. It must not 274 // call functions on the stack itself. 275 OnRecursiveDNSServerOption(tcpip.NICID, []tcpip.Address, time.Duration) 276 277 // OnDNSSearchListOption is called when the stack learns of DNS search lists 278 // through NDP. 279 // 280 // It is up to the caller to use the domain names in the search list 281 // for only their valid lifetime. OnDNSSearchListOption may be called 282 // with new or already known domain names. If called with known domain 283 // names, their valid lifetimes must be refreshed to the lifetime (it may 284 // be increased, decreased or completely invalidated when the lifetime = 0. 285 OnDNSSearchListOption(tcpip.NICID, []string, time.Duration) 286 287 // OnDHCPv6Configuration is called with an updated configuration that is 288 // available via DHCPv6 for the passed NIC. 289 // 290 // This function is not permitted to block indefinitely. It must not 291 // call functions on the stack itself. 292 OnDHCPv6Configuration(tcpip.NICID, DHCPv6ConfigurationFromNDPRA) 293 } 294 295 var _ fmt.Stringer = HandleRAsConfiguration(0) 296 297 // HandleRAsConfiguration enumerates when RAs may be handled. 298 type HandleRAsConfiguration int 299 300 const ( 301 // HandlingRAsDisabled indicates that Router Advertisements will not be 302 // handled. 303 HandlingRAsDisabled HandleRAsConfiguration = iota 304 305 // HandlingRAsEnabledWhenForwardingDisabled indicates that router 306 // advertisements will only be handled when forwarding is disabled. 307 HandlingRAsEnabledWhenForwardingDisabled 308 309 // HandlingRAsAlwaysEnabled indicates that Router Advertisements will always 310 // be handled, even when forwarding is enabled. 311 HandlingRAsAlwaysEnabled 312 ) 313 314 // String implements fmt.Stringer. 315 func (c HandleRAsConfiguration) String() string { 316 switch c { 317 case HandlingRAsDisabled: 318 return "HandlingRAsDisabled" 319 case HandlingRAsEnabledWhenForwardingDisabled: 320 return "HandlingRAsEnabledWhenForwardingDisabled" 321 case HandlingRAsAlwaysEnabled: 322 return "HandlingRAsAlwaysEnabled" 323 default: 324 return fmt.Sprintf("HandleRAsConfiguration(%d)", c) 325 } 326 } 327 328 // enabled returns true iff Router Advertisements may be handled given the 329 // specified forwarding status. 330 func (c HandleRAsConfiguration) enabled(forwarding bool) bool { 331 switch c { 332 case HandlingRAsDisabled: 333 return false 334 case HandlingRAsEnabledWhenForwardingDisabled: 335 return !forwarding 336 case HandlingRAsAlwaysEnabled: 337 return true 338 default: 339 panic(fmt.Sprintf("unhandled HandleRAsConfiguration = %d", c)) 340 } 341 } 342 343 // NDPConfigurations is the NDP configurations for the netstack. 344 type NDPConfigurations struct { 345 // The number of Router Solicitation messages to send when the IPv6 endpoint 346 // becomes enabled. 347 // 348 // Ignored unless configured to handle Router Advertisements. 349 MaxRtrSolicitations uint8 350 351 // The amount of time between transmitting Router Solicitation messages. 352 // 353 // Must be greater than or equal to 0.5s. 354 RtrSolicitationInterval time.Duration 355 356 // The maximum amount of time before transmitting the first Router 357 // Solicitation message. 358 // 359 // Must be greater than or equal to 0s. 360 MaxRtrSolicitationDelay time.Duration 361 362 // HandleRAs is the configuration for when Router Advertisements should be 363 // handled. 364 HandleRAs HandleRAsConfiguration 365 366 // DiscoverDefaultRouters determines whether or not default routers are 367 // discovered from Router Advertisements, as per RFC 4861 section 6. This 368 // configuration is ignored if RAs will not be processed (see HandleRAs). 369 DiscoverDefaultRouters bool 370 371 // DiscoverMoreSpecificRoutes determines whether or not more specific routes 372 // are discovered from Router Advertisements, as per RFC 4191. This 373 // configuration is ignored if RAs will not be processed (see HandleRAs). 374 DiscoverMoreSpecificRoutes bool 375 376 // DiscoverOnLinkPrefixes determines whether or not on-link prefixes are 377 // discovered from Router Advertisements' Prefix Information option, as per 378 // RFC 4861 section 6. This configuration is ignored if RAs will not be 379 // processed (see HandleRAs). 380 DiscoverOnLinkPrefixes bool 381 382 // AutoGenGlobalAddresses determines whether or not an IPv6 endpoint performs 383 // SLAAC to auto-generate global SLAAC addresses in response to Prefix 384 // Information options, as per RFC 4862. 385 // 386 // Note, if an address was already generated for some unique prefix, as 387 // part of SLAAC, this option does not affect whether or not the 388 // lifetime(s) of the generated address changes; this option only 389 // affects the generation of new addresses as part of SLAAC. 390 AutoGenGlobalAddresses bool 391 392 // AutoGenAddressConflictRetries determines how many times to attempt to retry 393 // generation of a permanent auto-generated address in response to DAD 394 // conflicts. 395 // 396 // If the method used to generate the address does not support creating 397 // alternative addresses (e.g. IIDs based on the modified EUI64 of a NIC's 398 // MAC address), then no attempt is made to resolve the conflict. 399 AutoGenAddressConflictRetries uint8 400 401 // AutoGenTempGlobalAddresses determines whether or not temporary SLAAC 402 // addresses are generated for an IPv6 endpoint as part of SLAAC privacy 403 // extensions, as per RFC 4941. 404 // 405 // Ignored if AutoGenGlobalAddresses is false. 406 AutoGenTempGlobalAddresses bool 407 408 // MaxTempAddrValidLifetime is the maximum valid lifetime for temporary 409 // SLAAC addresses. 410 MaxTempAddrValidLifetime time.Duration 411 412 // MaxTempAddrPreferredLifetime is the maximum preferred lifetime for 413 // temporary SLAAC addresses. 414 MaxTempAddrPreferredLifetime time.Duration 415 416 // RegenAdvanceDuration is the duration before the deprecation of a temporary 417 // address when a new address will be generated. 418 RegenAdvanceDuration time.Duration 419 } 420 421 // DefaultNDPConfigurations returns an NDPConfigurations populated with 422 // default values. 423 func DefaultNDPConfigurations() NDPConfigurations { 424 return NDPConfigurations{ 425 MaxRtrSolicitations: defaultMaxRtrSolicitations, 426 RtrSolicitationInterval: defaultRtrSolicitationInterval, 427 MaxRtrSolicitationDelay: defaultMaxRtrSolicitationDelay, 428 HandleRAs: defaultHandleRAs, 429 DiscoverDefaultRouters: defaultDiscoverDefaultRouters, 430 DiscoverMoreSpecificRoutes: defaultDiscoverMoreSpecificRoutes, 431 DiscoverOnLinkPrefixes: defaultDiscoverOnLinkPrefixes, 432 AutoGenGlobalAddresses: defaultAutoGenGlobalAddresses, 433 AutoGenTempGlobalAddresses: defaultAutoGenTempGlobalAddresses, 434 MaxTempAddrValidLifetime: defaultMaxTempAddrValidLifetime, 435 MaxTempAddrPreferredLifetime: defaultMaxTempAddrPreferredLifetime, 436 RegenAdvanceDuration: defaultRegenAdvanceDuration, 437 } 438 } 439 440 // validate modifies an NDPConfigurations with valid values. If invalid values 441 // are present in c, the corresponding default values are used instead. 442 func (c *NDPConfigurations) validate() { 443 if c.RtrSolicitationInterval < minimumRtrSolicitationInterval { 444 c.RtrSolicitationInterval = defaultRtrSolicitationInterval 445 } 446 447 if c.MaxRtrSolicitationDelay < minimumMaxRtrSolicitationDelay { 448 c.MaxRtrSolicitationDelay = defaultMaxRtrSolicitationDelay 449 } 450 451 if c.MaxTempAddrValidLifetime < MinMaxTempAddrValidLifetime { 452 c.MaxTempAddrValidLifetime = MinMaxTempAddrValidLifetime 453 } 454 455 if c.MaxTempAddrPreferredLifetime < MinMaxTempAddrPreferredLifetime || c.MaxTempAddrPreferredLifetime > c.MaxTempAddrValidLifetime { 456 c.MaxTempAddrPreferredLifetime = MinMaxTempAddrPreferredLifetime 457 } 458 459 if c.RegenAdvanceDuration < minRegenAdvanceDuration { 460 c.RegenAdvanceDuration = minRegenAdvanceDuration 461 } 462 } 463 464 type timer struct { 465 // done indicates to the timer that the timer was stopped. 466 done *bool 467 468 timer tcpip.Timer 469 } 470 471 type offLinkRoute struct { 472 dest tcpip.Subnet 473 router tcpip.Address 474 } 475 476 // ndpState is the per-Interface NDP state. 477 type ndpState struct { 478 // Do not allow overwriting this state. 479 _ sync.NoCopy 480 481 // The IPv6 endpoint this ndpState is for. 482 ep *endpoint 483 484 // configs is the per-interface NDP configurations. 485 configs NDPConfigurations 486 487 // The DAD timers to send the next NS message, or resolve the address. 488 dad ip.DAD 489 490 // The off-link routes discovered through Router Advertisements. 491 offLinkRoutes map[offLinkRoute]offLinkRouteState 492 493 // rtrSolicitTimer is the timer used to send the next router solicitation 494 // message. 495 // 496 // rtrSolicitTimer is the zero value when NDP is not soliciting routers. 497 rtrSolicitTimer timer 498 499 // The on-link prefixes discovered through Router Advertisements' Prefix 500 // Information option. 501 onLinkPrefixes map[tcpip.Subnet]onLinkPrefixState 502 503 // The SLAAC prefixes discovered through Router Advertisements' Prefix 504 // Information option. 505 slaacPrefixes map[tcpip.Subnet]slaacPrefixState 506 507 // The last learned DHCPv6 configuration from an NDP RA. 508 dhcpv6Configuration DHCPv6ConfigurationFromNDPRA 509 510 // temporaryIIDHistory is the history value used to generate a new temporary 511 // IID. 512 temporaryIIDHistory [header.IIDSize]byte 513 514 // temporaryAddressDesyncFactor is the preferred lifetime's desync factor for 515 // temporary SLAAC addresses. 516 temporaryAddressDesyncFactor time.Duration 517 } 518 519 // offLinkRouteState holds data associated with an off-link route discovered by 520 // a Router Advertisement (RA). 521 type offLinkRouteState struct { 522 prf header.NDPRoutePreference 523 524 // Job to invalidate the route. 525 // 526 // Must not be nil. 527 invalidationJob *tcpip.Job 528 } 529 530 // onLinkPrefixState holds data associated with an on-link prefix discovered by 531 // a Router Advertisement's Prefix Information option (PI) when the NDP 532 // configurations was configured to do so. 533 type onLinkPrefixState struct { 534 // Job to invalidate the on-link prefix. 535 // 536 // Must not be nil. 537 invalidationJob *tcpip.Job 538 } 539 540 // tempSLAACAddrState holds state associated with a temporary SLAAC address. 541 type tempSLAACAddrState struct { 542 // Job to deprecate the temporary SLAAC address. 543 // 544 // Must not be nil. 545 deprecationJob *tcpip.Job 546 547 // Job to invalidate the temporary SLAAC address. 548 // 549 // Must not be nil. 550 invalidationJob *tcpip.Job 551 552 // Job to regenerate the temporary SLAAC address. 553 // 554 // Must not be nil. 555 regenJob *tcpip.Job 556 557 createdAt tcpip.MonotonicTime 558 559 // The address's endpoint. 560 // 561 // Must not be nil. 562 addressEndpoint stack.AddressEndpoint 563 564 // Has a new temporary SLAAC address already been regenerated? 565 regenerated bool 566 } 567 568 // slaacPrefixState holds state associated with a SLAAC prefix. 569 type slaacPrefixState struct { 570 // Job to deprecate the prefix. 571 // 572 // Must not be nil. 573 deprecationJob *tcpip.Job 574 575 // Job to invalidate the prefix. 576 // 577 // Must not be nil. 578 invalidationJob *tcpip.Job 579 580 // nil iff the address is valid forever. 581 validUntil *tcpip.MonotonicTime 582 583 // nil iff the address is preferred forever. 584 preferredUntil *tcpip.MonotonicTime 585 586 // State associated with the stable address generated for the prefix. 587 stableAddr struct { 588 // The address's endpoint. 589 // 590 // May only be nil when the address is being (re-)generated. Otherwise, 591 // must not be nil as all SLAAC prefixes must have a stable address. 592 addressEndpoint stack.AddressEndpoint 593 594 // The number of times an address has been generated locally where the IPv6 595 // endpoint already had the generated address. 596 localGenerationFailures uint8 597 } 598 599 // The temporary (short-lived) addresses generated for the SLAAC prefix. 600 tempAddrs map[tcpip.Address]tempSLAACAddrState 601 602 // The next two fields are used by both stable and temporary addresses 603 // generated for a SLAAC prefix. This is safe as only 1 address is in the 604 // generation and DAD process at any time. That is, no two addresses are 605 // generated at the same time for a given SLAAC prefix. 606 607 // The number of times an address has been generated and added to the IPv6 608 // endpoint. 609 // 610 // Addresses may be regenerated in reseponse to a DAD conflicts. 611 generationAttempts uint8 612 613 // The maximum number of times to attempt regeneration of a SLAAC address 614 // in response to DAD conflicts. 615 maxGenerationAttempts uint8 616 } 617 618 // startDuplicateAddressDetection performs Duplicate Address Detection. 619 // 620 // This function must only be called by IPv6 addresses that are currently 621 // tentative. 622 // 623 // The IPv6 endpoint that ndp belongs to MUST be locked. 624 func (ndp *ndpState) startDuplicateAddressDetection(addr tcpip.Address, addressEndpoint stack.AddressEndpoint) tcpip.Error { 625 // addr must be a valid unicast IPv6 address. 626 if !header.IsV6UnicastAddress(addr) { 627 return &tcpip.ErrAddressFamilyNotSupported{} 628 } 629 630 if addressEndpoint.GetKind() != stack.PermanentTentative { 631 // The endpoint should be marked as tentative since we are starting DAD. 632 panic(fmt.Sprintf("ndpdad: addr %s is not tentative on NIC(%d)", addr, ndp.ep.nic.ID())) 633 } 634 635 ret := ndp.dad.CheckDuplicateAddressLocked(addr, func(r stack.DADResult) { 636 if addressEndpoint.GetKind() != stack.PermanentTentative { 637 // The endpoint should still be marked as tentative since we are still 638 // performing DAD on it. 639 panic(fmt.Sprintf("ndpdad: addr %s is no longer tentative on NIC(%d)", addr, ndp.ep.nic.ID())) 640 } 641 642 var dadSucceeded bool 643 switch r.(type) { 644 case *stack.DADAborted, *stack.DADError, *stack.DADDupAddrDetected: 645 dadSucceeded = false 646 case *stack.DADSucceeded: 647 dadSucceeded = true 648 default: 649 panic(fmt.Sprintf("unrecognized DAD result = %T", r)) 650 } 651 652 if dadSucceeded { 653 addressEndpoint.SetKind(stack.Permanent) 654 } 655 656 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 657 ndpDisp.OnDuplicateAddressDetectionResult(ndp.ep.nic.ID(), addr, r) 658 } 659 660 if dadSucceeded { 661 if addressEndpoint.ConfigType() == stack.AddressConfigSlaac && !addressEndpoint.Temporary() { 662 // Reset the generation attempts counter as we are starting the 663 // generation of a new address for the SLAAC prefix. 664 ndp.regenerateTempSLAACAddr(addressEndpoint.AddressWithPrefix().Subnet(), true /* resetGenAttempts */) 665 } 666 ndp.ep.onAddressAssignedLocked(addr) 667 } 668 }) 669 670 switch ret { 671 case stack.DADStarting: 672 case stack.DADAlreadyRunning: 673 panic(fmt.Sprintf("ndpdad: already performing DAD for addr %s on NIC(%d)", addr, ndp.ep.nic.ID())) 674 case stack.DADDisabled: 675 addressEndpoint.SetKind(stack.Permanent) 676 677 // Consider DAD to have resolved even if no DAD messages were actually 678 // transmitted. 679 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 680 ndpDisp.OnDuplicateAddressDetectionResult(ndp.ep.nic.ID(), addr, &stack.DADSucceeded{}) 681 } 682 683 ndp.ep.onAddressAssignedLocked(addr) 684 } 685 686 return nil 687 } 688 689 // stopDuplicateAddressDetection ends a running Duplicate Address Detection 690 // process. Note, this may leave the DAD process for a tentative address in 691 // such a state forever, unless some other external event resolves the DAD 692 // process (receiving an NA from the true owner of addr, or an NS for addr 693 // (implying another node is attempting to use addr)). It is up to the caller 694 // of this function to handle such a scenario. 695 // 696 // The IPv6 endpoint that ndp belongs to MUST be locked. 697 func (ndp *ndpState) stopDuplicateAddressDetection(addr tcpip.Address, reason stack.DADResult) { 698 ndp.dad.StopLocked(addr, reason) 699 } 700 701 // handleRA handles a Router Advertisement message that arrived on the NIC 702 // this ndp is for. Does nothing if the NIC is configured to not handle RAs. 703 // 704 // The IPv6 endpoint that ndp belongs to MUST be locked. 705 func (ndp *ndpState) handleRA(ip tcpip.Address, ra header.NDPRouterAdvert) { 706 // Is the IPv6 endpoint configured to handle RAs at all? 707 // 708 // Currently, the stack does not determine router interface status on a 709 // per-interface basis; it is a protocol-wide configuration, so we check the 710 // protocol's forwarding flag to determine if the IPv6 endpoint is forwarding 711 // packets. 712 if !ndp.configs.HandleRAs.enabled(ndp.ep.Forwarding()) { 713 ndp.ep.stats.localStats.UnhandledRouterAdvertisements.Increment() 714 return 715 } 716 717 // Only worry about the DHCPv6 configuration if we have an NDPDispatcher as we 718 // only inform the dispatcher on configuration changes. We do nothing else 719 // with the information. 720 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 721 var configuration DHCPv6ConfigurationFromNDPRA 722 switch { 723 case ra.ManagedAddrConfFlag(): 724 configuration = DHCPv6ManagedAddress 725 726 case ra.OtherConfFlag(): 727 configuration = DHCPv6OtherConfigurations 728 729 default: 730 configuration = DHCPv6NoConfiguration 731 } 732 733 if ndp.dhcpv6Configuration != configuration { 734 ndp.dhcpv6Configuration = configuration 735 ndpDisp.OnDHCPv6Configuration(ndp.ep.nic.ID(), configuration) 736 } 737 } 738 739 // Is the IPv6 endpoint configured to discover default routers? 740 if ndp.configs.DiscoverDefaultRouters { 741 prf := ra.DefaultRouterPreference() 742 if prf == header.ReservedRoutePreference { 743 // As per RFC 4191 section 2.2, 744 // 745 // Prf (Default Router Preference) 746 // 747 // If the Reserved (10) value is received, the receiver MUST treat the 748 // value as if it were (00). 749 // 750 // Note that the value 00 is the medium (default) router preference value. 751 prf = header.MediumRoutePreference 752 } 753 754 // We represent default routers with a default (off-link) route through the 755 // router. 756 ndp.handleOffLinkRouteDiscovery(offLinkRoute{dest: header.IPv6EmptySubnet, router: ip}, ra.RouterLifetime(), prf) 757 } 758 759 // TODO(b/141556115): Do (RetransTimer, ReachableTime)) Parameter 760 // Discovery. 761 762 // We know the options is valid as far as wire format is concerned since 763 // we got the Router Advertisement, as documented by this fn. Given this 764 // we do not check the iterator for errors on calls to Next. 765 it, _ := ra.Options().Iter(false) 766 for opt, done, _ := it.Next(); !done; opt, done, _ = it.Next() { 767 switch opt := opt.(type) { 768 case header.NDPRecursiveDNSServer: 769 if ndp.ep.protocol.options.NDPDisp == nil { 770 continue 771 } 772 773 addrs, _ := opt.Addresses() 774 ndp.ep.protocol.options.NDPDisp.OnRecursiveDNSServerOption(ndp.ep.nic.ID(), addrs, opt.Lifetime()) 775 776 case header.NDPDNSSearchList: 777 if ndp.ep.protocol.options.NDPDisp == nil { 778 continue 779 } 780 781 domainNames, _ := opt.DomainNames() 782 ndp.ep.protocol.options.NDPDisp.OnDNSSearchListOption(ndp.ep.nic.ID(), domainNames, opt.Lifetime()) 783 784 case header.NDPPrefixInformation: 785 prefix := opt.Subnet() 786 787 // Is the prefix a link-local? 788 if header.IsV6LinkLocalUnicastAddress(prefix.ID()) { 789 // ...Yes, skip as per RFC 4861 section 6.3.4, 790 // and RFC 4862 section 5.5.3.b (for SLAAC). 791 continue 792 } 793 794 // Is the Prefix Length 0? 795 if prefix.Prefix() == 0 { 796 // ...Yes, skip as this is an invalid prefix 797 // as all IPv6 addresses cannot be on-link. 798 continue 799 } 800 801 if opt.OnLinkFlag() { 802 ndp.handleOnLinkPrefixInformation(opt) 803 } 804 805 if opt.AutonomousAddressConfigurationFlag() { 806 ndp.handleAutonomousPrefixInformation(opt) 807 } 808 809 case header.NDPRouteInformation: 810 if !ndp.configs.DiscoverMoreSpecificRoutes { 811 continue 812 } 813 814 dest, err := opt.Prefix() 815 if err != nil { 816 panic(fmt.Sprintf("%T.Prefix(): %s", opt, err)) 817 } 818 819 prf := opt.RoutePreference() 820 if prf == header.ReservedRoutePreference { 821 // As per RFC 4191 section 2.3, 822 // 823 // Prf (Route Preference) 824 // 2-bit signed integer. The Route Preference indicates 825 // whether to prefer the router associated with this prefix 826 // over others, when multiple identical prefixes (for 827 // different routers) have been received. If the Reserved 828 // (10) value is received, the Route Information Option MUST 829 // be ignored. 830 continue 831 } 832 833 ndp.handleOffLinkRouteDiscovery(offLinkRoute{dest: dest, router: ip}, opt.RouteLifetime(), prf) 834 } 835 836 // TODO(b/141556115): Do (MTU) Parameter Discovery. 837 } 838 } 839 840 // invalidateOffLinkRoute invalidates a discovered off-link route. 841 // 842 // The IPv6 endpoint that ndp belongs to MUST be locked. 843 func (ndp *ndpState) invalidateOffLinkRoute(route offLinkRoute) { 844 state, ok := ndp.offLinkRoutes[route] 845 if !ok { 846 return 847 } 848 849 state.invalidationJob.Cancel() 850 delete(ndp.offLinkRoutes, route) 851 852 // Let the integrator know a discovered off-link route is invalidated. 853 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 854 ndpDisp.OnOffLinkRouteInvalidated(ndp.ep.nic.ID(), route.dest, route.router) 855 } 856 } 857 858 // handleOffLinkRouteDiscovery handles the discovery of an off-link route. 859 // 860 // Precondition: ndp.ep.mu must be locked. 861 func (ndp *ndpState) handleOffLinkRouteDiscovery(route offLinkRoute, lifetime time.Duration, prf header.NDPRoutePreference) { 862 ndpDisp := ndp.ep.protocol.options.NDPDisp 863 if ndpDisp == nil { 864 return 865 } 866 867 state, ok := ndp.offLinkRoutes[route] 868 switch { 869 case !ok && lifetime != 0: 870 // This is a new route we are discovering. 871 // 872 // Only remember it if we currently know about less than 873 // MaxDiscoveredOffLinkRoutes routers. 874 if len(ndp.offLinkRoutes) < MaxDiscoveredOffLinkRoutes { 875 // Inform the integrator when we discovered an off-link route. 876 ndpDisp.OnOffLinkRouteUpdated(ndp.ep.nic.ID(), route.dest, route.router, prf) 877 878 state := offLinkRouteState{ 879 prf: prf, 880 invalidationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 881 ndp.invalidateOffLinkRoute(route) 882 }), 883 } 884 885 state.invalidationJob.Schedule(lifetime) 886 887 ndp.offLinkRoutes[route] = state 888 } 889 890 case ok && lifetime != 0: 891 // This is an already discovered off-link route. Update the lifetime. 892 state.invalidationJob.Cancel() 893 state.invalidationJob.Schedule(lifetime) 894 895 if prf != state.prf { 896 state.prf = prf 897 898 // Inform the integrator about route preference updates. 899 ndpDisp.OnOffLinkRouteUpdated(ndp.ep.nic.ID(), route.dest, route.router, prf) 900 } 901 902 ndp.offLinkRoutes[route] = state 903 904 case ok && lifetime == 0: 905 // The already discovered off-link route is no longer considered valid so we 906 // invalidate it immediately. 907 ndp.invalidateOffLinkRoute(route) 908 } 909 } 910 911 // rememberOnLinkPrefix remembers a newly discovered on-link prefix with IPv6 912 // address with prefix prefix with lifetime l. 913 // 914 // The prefix identified by prefix MUST NOT already be known. 915 // 916 // The IPv6 endpoint that ndp belongs to MUST be locked. 917 func (ndp *ndpState) rememberOnLinkPrefix(prefix tcpip.Subnet, l time.Duration) { 918 ndpDisp := ndp.ep.protocol.options.NDPDisp 919 if ndpDisp == nil { 920 return 921 } 922 923 // Inform the integrator when we discovered an on-link prefix. 924 ndpDisp.OnOnLinkPrefixDiscovered(ndp.ep.nic.ID(), prefix) 925 926 state := onLinkPrefixState{ 927 invalidationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 928 ndp.invalidateOnLinkPrefix(prefix) 929 }), 930 } 931 932 if l < header.NDPInfiniteLifetime { 933 state.invalidationJob.Schedule(l) 934 } 935 936 ndp.onLinkPrefixes[prefix] = state 937 } 938 939 // invalidateOnLinkPrefix invalidates a discovered on-link prefix. 940 // 941 // The IPv6 endpoint that ndp belongs to MUST be locked. 942 func (ndp *ndpState) invalidateOnLinkPrefix(prefix tcpip.Subnet) { 943 s, ok := ndp.onLinkPrefixes[prefix] 944 945 // Is the on-link prefix still discovered? 946 if !ok { 947 // ...Nope, do nothing further. 948 return 949 } 950 951 s.invalidationJob.Cancel() 952 delete(ndp.onLinkPrefixes, prefix) 953 954 // Let the integrator know a discovered on-link prefix is invalidated. 955 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 956 ndpDisp.OnOnLinkPrefixInvalidated(ndp.ep.nic.ID(), prefix) 957 } 958 } 959 960 // handleOnLinkPrefixInformation handles a Prefix Information option with 961 // its on-link flag set, as per RFC 4861 section 6.3.4. 962 // 963 // handleOnLinkPrefixInformation assumes that the prefix this pi is for is 964 // not the link-local prefix and the on-link flag is set. 965 // 966 // The IPv6 endpoint that ndp belongs to MUST be locked. 967 func (ndp *ndpState) handleOnLinkPrefixInformation(pi header.NDPPrefixInformation) { 968 prefix := pi.Subnet() 969 prefixState, ok := ndp.onLinkPrefixes[prefix] 970 vl := pi.ValidLifetime() 971 972 if !ok && vl == 0 { 973 // Don't know about this prefix but it has a zero valid 974 // lifetime, so just ignore. 975 return 976 } 977 978 if !ok && vl != 0 { 979 // This is a new on-link prefix we are discovering 980 // 981 // Only remember it if we currently know about less than 982 // MaxDiscoveredOnLinkPrefixes on-link prefixes. 983 if ndp.configs.DiscoverOnLinkPrefixes && len(ndp.onLinkPrefixes) < MaxDiscoveredOnLinkPrefixes { 984 ndp.rememberOnLinkPrefix(prefix, vl) 985 } 986 return 987 } 988 989 if ok && vl == 0 { 990 // We know about the on-link prefix, but it is 991 // no longer to be considered on-link, so 992 // invalidate it. 993 ndp.invalidateOnLinkPrefix(prefix) 994 return 995 } 996 997 // This is an already discovered on-link prefix with a 998 // new non-zero valid lifetime. 999 // 1000 // Update the invalidation job. 1001 1002 prefixState.invalidationJob.Cancel() 1003 1004 if vl < header.NDPInfiniteLifetime { 1005 // Prefix is valid for a finite lifetime, schedule the job to execute after 1006 // the new valid lifetime. 1007 prefixState.invalidationJob.Schedule(vl) 1008 } 1009 1010 ndp.onLinkPrefixes[prefix] = prefixState 1011 } 1012 1013 // handleAutonomousPrefixInformation handles a Prefix Information option with 1014 // its autonomous flag set, as per RFC 4862 section 5.5.3. 1015 // 1016 // handleAutonomousPrefixInformation assumes that the prefix this pi is for is 1017 // not the link-local prefix and the autonomous flag is set. 1018 // 1019 // The IPv6 endpoint that ndp belongs to MUST be locked. 1020 func (ndp *ndpState) handleAutonomousPrefixInformation(pi header.NDPPrefixInformation) { 1021 vl := pi.ValidLifetime() 1022 pl := pi.PreferredLifetime() 1023 1024 // If the preferred lifetime is greater than the valid lifetime, 1025 // silently ignore the Prefix Information option, as per RFC 4862 1026 // section 5.5.3.c. 1027 if pl > vl { 1028 return 1029 } 1030 1031 prefix := pi.Subnet() 1032 1033 // Check if we already maintain SLAAC state for prefix. 1034 if state, ok := ndp.slaacPrefixes[prefix]; ok { 1035 // As per RFC 4862 section 5.5.3.e, refresh prefix's SLAAC lifetimes. 1036 ndp.refreshSLAACPrefixLifetimes(prefix, &state, pl, vl) 1037 ndp.slaacPrefixes[prefix] = state 1038 return 1039 } 1040 1041 // prefix is a new SLAAC prefix. Do the work as outlined by RFC 4862 section 1042 // 5.5.3.d if ndp is configured to auto-generate new addresses via SLAAC. 1043 if !ndp.configs.AutoGenGlobalAddresses { 1044 return 1045 } 1046 1047 // Limit the number of discovered SLAAC prefixes. 1048 if len(ndp.slaacPrefixes) == MaxDiscoveredSLAACPrefixes { 1049 return 1050 } 1051 1052 ndp.doSLAAC(prefix, pl, vl) 1053 } 1054 1055 // doSLAAC generates a new SLAAC address with the provided lifetimes 1056 // for prefix. 1057 // 1058 // pl is the new preferred lifetime. vl is the new valid lifetime. 1059 // 1060 // The IPv6 endpoint that ndp belongs to MUST be locked. 1061 func (ndp *ndpState) doSLAAC(prefix tcpip.Subnet, pl, vl time.Duration) { 1062 // If we do not already have an address for this prefix and the valid 1063 // lifetime is 0, no need to do anything further, as per RFC 4862 1064 // section 5.5.3.d. 1065 if vl == 0 { 1066 return 1067 } 1068 1069 // Make sure the prefix is valid (as far as its length is concerned) to 1070 // generate a valid IPv6 address from an interface identifier (IID), as 1071 // per RFC 4862 sectiion 5.5.3.d. 1072 if prefix.Prefix() != validPrefixLenForAutoGen { 1073 return 1074 } 1075 1076 state := slaacPrefixState{ 1077 deprecationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 1078 state, ok := ndp.slaacPrefixes[prefix] 1079 if !ok { 1080 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry for the deprecated SLAAC prefix %s", prefix)) 1081 } 1082 1083 ndp.deprecateSLAACAddress(state.stableAddr.addressEndpoint) 1084 }), 1085 invalidationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 1086 state, ok := ndp.slaacPrefixes[prefix] 1087 if !ok { 1088 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry for the invalidated SLAAC prefix %s", prefix)) 1089 } 1090 1091 ndp.invalidateSLAACPrefix(prefix, state) 1092 }), 1093 tempAddrs: make(map[tcpip.Address]tempSLAACAddrState), 1094 maxGenerationAttempts: ndp.configs.AutoGenAddressConflictRetries + 1, 1095 } 1096 1097 now := ndp.ep.protocol.stack.Clock().NowMonotonic() 1098 1099 // The time an address is preferred until is needed to properly generate the 1100 // address. 1101 if pl < header.NDPInfiniteLifetime { 1102 t := now.Add(pl) 1103 state.preferredUntil = &t 1104 } 1105 // The time at which an address is invalidated is exposed as a property of the 1106 // address. 1107 if vl < header.NDPInfiniteLifetime { 1108 t := now.Add(vl) 1109 state.validUntil = &t 1110 } 1111 1112 if !ndp.generateSLAACAddr(prefix, &state) { 1113 // We were unable to generate an address for the prefix, we do not nothing 1114 // further as there is no reason to maintain state or jobs for a prefix we 1115 // do not have an address for. 1116 return 1117 } 1118 1119 // Setup the initial jobs to deprecate and invalidate prefix. 1120 1121 if pl < header.NDPInfiniteLifetime && pl != 0 { 1122 state.deprecationJob.Schedule(pl) 1123 } 1124 1125 if vl < header.NDPInfiniteLifetime { 1126 state.invalidationJob.Schedule(vl) 1127 } 1128 1129 // If the address is assigned (DAD resolved), generate a temporary address. 1130 if state.stableAddr.addressEndpoint.GetKind() == stack.Permanent { 1131 // Reset the generation attempts counter as we are starting the generation 1132 // of a new address for the SLAAC prefix. 1133 ndp.generateTempSLAACAddr(prefix, &state, true /* resetGenAttempts */) 1134 } 1135 1136 ndp.slaacPrefixes[prefix] = state 1137 } 1138 1139 // addAndAcquireSLAACAddr adds a SLAAC address to the IPv6 endpoint. 1140 // 1141 // The IPv6 endpoint that ndp belongs to MUST be locked. 1142 func (ndp *ndpState) addAndAcquireSLAACAddr(addr tcpip.AddressWithPrefix, temporary bool, lifetimes stack.AddressLifetimes) stack.AddressEndpoint { 1143 addressEndpoint, err := ndp.ep.addAndAcquirePermanentAddressLocked(addr, stack.AddressProperties{ 1144 PEB: stack.FirstPrimaryEndpoint, 1145 ConfigType: stack.AddressConfigSlaac, 1146 Lifetimes: lifetimes, 1147 Temporary: temporary, 1148 }) 1149 if err != nil { 1150 panic(fmt.Sprintf("ndp: error when adding SLAAC address %+v: %s", addr, err)) 1151 } 1152 1153 // Inform the integrator that we have a new SLAAC address. 1154 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1155 if disp := ndpDisp.OnAutoGenAddress(ndp.ep.nic.ID(), addr); disp != nil { 1156 addressEndpoint.RegisterDispatcher(disp) 1157 } 1158 } 1159 1160 return addressEndpoint 1161 } 1162 1163 // generateSLAACAddr generates a SLAAC address for prefix. 1164 // 1165 // Returns true if an address was successfully generated. 1166 // 1167 // Panics if the prefix is not a SLAAC prefix or it already has an address. 1168 // 1169 // The IPv6 endpoint that ndp belongs to MUST be locked. 1170 func (ndp *ndpState) generateSLAACAddr(prefix tcpip.Subnet, state *slaacPrefixState) bool { 1171 if addressEndpoint := state.stableAddr.addressEndpoint; addressEndpoint != nil { 1172 panic(fmt.Sprintf("ndp: SLAAC prefix %s already has a permanent address %s", prefix, addressEndpoint.AddressWithPrefix())) 1173 } 1174 1175 // If we have already reached the maximum address generation attempts for the 1176 // prefix, do not generate another address. 1177 if state.generationAttempts == state.maxGenerationAttempts { 1178 return false 1179 } 1180 1181 var generatedAddr tcpip.AddressWithPrefix 1182 prefixID := prefix.ID() 1183 addrBytes := prefixID.AsSlice() 1184 1185 for i := 0; ; i++ { 1186 // If we were unable to generate an address after the maximum SLAAC address 1187 // local regeneration attempts, do nothing further. 1188 if i == maxSLAACAddrLocalRegenAttempts { 1189 return false 1190 } 1191 1192 dadCounter := state.generationAttempts + state.stableAddr.localGenerationFailures 1193 if oIID := ndp.ep.protocol.options.OpaqueIIDOpts; oIID.NICNameFromID != nil { 1194 addrBytes = header.AppendOpaqueInterfaceIdentifier( 1195 addrBytes[:header.IIDOffsetInIPv6Address], 1196 prefix, 1197 oIID.NICNameFromID(ndp.ep.nic.ID(), ndp.ep.nic.Name()), 1198 dadCounter, 1199 oIID.SecretKey, 1200 ) 1201 } else if dadCounter == 0 { 1202 // Modified-EUI64 based IIDs have no way to resolve DAD conflicts, so if 1203 // the DAD counter is non-zero, we cannot use this method. 1204 // 1205 // Only attempt to generate an interface-specific IID if we have a valid 1206 // link address. 1207 // 1208 // TODO(b/141011931): Validate a LinkEndpoint's link address (provided by 1209 // LinkEndpoint.LinkAddress) before reaching this point. 1210 linkAddr := ndp.ep.nic.LinkAddress() 1211 if !header.IsValidUnicastEthernetAddress(linkAddr) { 1212 return false 1213 } 1214 1215 // Generate an address within prefix from the modified EUI-64 of ndp's 1216 // NIC's Ethernet MAC address. 1217 header.EthernetAdddressToModifiedEUI64IntoBuf(linkAddr, addrBytes[header.IIDOffsetInIPv6Address:]) 1218 } else { 1219 // We have no way to regenerate an address in response to an address 1220 // conflict when addresses are not generated with opaque IIDs. 1221 return false 1222 } 1223 1224 generatedAddr = tcpip.AddressWithPrefix{ 1225 Address: tcpip.AddrFrom16Slice(addrBytes), 1226 PrefixLen: validPrefixLenForAutoGen, 1227 } 1228 1229 if !ndp.ep.hasPermanentAddressRLocked(generatedAddr.Address) { 1230 break 1231 } 1232 1233 state.stableAddr.localGenerationFailures++ 1234 } 1235 1236 deprecated := state.preferredUntil != nil && !state.preferredUntil.After(ndp.ep.protocol.stack.Clock().NowMonotonic()) 1237 var preferredUntil tcpip.MonotonicTime 1238 if !deprecated { 1239 if state.preferredUntil != nil { 1240 preferredUntil = *state.preferredUntil 1241 } else { 1242 preferredUntil = tcpip.MonotonicTimeInfinite() 1243 } 1244 } 1245 validUntil := tcpip.MonotonicTimeInfinite() 1246 if state.validUntil != nil { 1247 validUntil = *state.validUntil 1248 } 1249 if addressEndpoint := ndp.addAndAcquireSLAACAddr(generatedAddr, false /* temporary */, stack.AddressLifetimes{ 1250 Deprecated: deprecated, 1251 PreferredUntil: preferredUntil, 1252 ValidUntil: validUntil, 1253 }); addressEndpoint != nil { 1254 state.stableAddr.addressEndpoint = addressEndpoint 1255 state.generationAttempts++ 1256 return true 1257 } 1258 1259 return false 1260 } 1261 1262 // regenerateSLAACAddr regenerates an address for a SLAAC prefix. 1263 // 1264 // If generating a new address for the prefix fails, the prefix is invalidated. 1265 // 1266 // The IPv6 endpoint that ndp belongs to MUST be locked. 1267 func (ndp *ndpState) regenerateSLAACAddr(prefix tcpip.Subnet) { 1268 state, ok := ndp.slaacPrefixes[prefix] 1269 if !ok { 1270 panic(fmt.Sprintf("ndp: SLAAC prefix state not found to regenerate address for %s", prefix)) 1271 } 1272 1273 if ndp.generateSLAACAddr(prefix, &state) { 1274 ndp.slaacPrefixes[prefix] = state 1275 return 1276 } 1277 1278 // We were unable to generate a permanent address for the SLAAC prefix so 1279 // invalidate the prefix as there is no reason to maintain state for a 1280 // SLAAC prefix we do not have an address for. 1281 ndp.invalidateSLAACPrefix(prefix, state) 1282 } 1283 1284 // generateTempSLAACAddr generates a new temporary SLAAC address. 1285 // 1286 // If resetGenAttempts is true, the prefix's generation counter is reset. 1287 // 1288 // Returns true if a new address was generated. 1289 func (ndp *ndpState) generateTempSLAACAddr(prefix tcpip.Subnet, prefixState *slaacPrefixState, resetGenAttempts bool) bool { 1290 // Are we configured to auto-generate new temporary global addresses for the 1291 // prefix? 1292 if !ndp.configs.AutoGenTempGlobalAddresses || prefix == header.IPv6LinkLocalPrefix.Subnet() { 1293 return false 1294 } 1295 1296 if resetGenAttempts { 1297 prefixState.generationAttempts = 0 1298 prefixState.maxGenerationAttempts = ndp.configs.AutoGenAddressConflictRetries + 1 1299 } 1300 1301 // If we have already reached the maximum address generation attempts for the 1302 // prefix, do not generate another address. 1303 if prefixState.generationAttempts == prefixState.maxGenerationAttempts { 1304 return false 1305 } 1306 1307 stableAddr := prefixState.stableAddr.addressEndpoint.AddressWithPrefix().Address 1308 now := ndp.ep.protocol.stack.Clock().NowMonotonic() 1309 1310 // As per RFC 4941 section 3.3 step 4, the valid lifetime of a temporary 1311 // address is the lower of the valid lifetime of the stable address or the 1312 // maximum temporary address valid lifetime. 1313 vl := ndp.configs.MaxTempAddrValidLifetime 1314 if prefixState.validUntil != nil { 1315 if prefixVL := prefixState.validUntil.Sub(now); vl > prefixVL { 1316 vl = prefixVL 1317 } 1318 } 1319 1320 if vl <= 0 { 1321 // Cannot create an address without a valid lifetime. 1322 return false 1323 } 1324 1325 // As per RFC 4941 section 3.3 step 4, the preferred lifetime of a temporary 1326 // address is the lower of the preferred lifetime of the stable address or the 1327 // maximum temporary address preferred lifetime - the temporary address desync 1328 // factor. 1329 pl := ndp.configs.MaxTempAddrPreferredLifetime - ndp.temporaryAddressDesyncFactor 1330 if prefixState.preferredUntil != nil { 1331 if prefixPL := prefixState.preferredUntil.Sub(now); pl > prefixPL { 1332 // Respect the preferred lifetime of the prefix, as per RFC 4941 section 1333 // 3.3 step 4. 1334 pl = prefixPL 1335 } 1336 } 1337 1338 // As per RFC 4941 section 3.3 step 5, a temporary address is created only if 1339 // the calculated preferred lifetime is greater than the advance regeneration 1340 // duration. In particular, we MUST NOT create a temporary address with a zero 1341 // Preferred Lifetime. 1342 if pl <= ndp.configs.RegenAdvanceDuration { 1343 return false 1344 } 1345 1346 // Attempt to generate a new address that is not already assigned to the IPv6 1347 // endpoint. 1348 var generatedAddr tcpip.AddressWithPrefix 1349 for i := 0; ; i++ { 1350 // If we were unable to generate an address after the maximum SLAAC address 1351 // local regeneration attempts, do nothing further. 1352 if i == maxSLAACAddrLocalRegenAttempts { 1353 return false 1354 } 1355 1356 generatedAddr = header.GenerateTempIPv6SLAACAddr(ndp.temporaryIIDHistory[:], stableAddr) 1357 if !ndp.ep.hasPermanentAddressRLocked(generatedAddr.Address) { 1358 break 1359 } 1360 } 1361 1362 // As per RFC RFC 4941 section 3.3 step 5, we MUST NOT create a temporary 1363 // address with a zero preferred lifetime. The checks above ensure this 1364 // so we know the address is not deprecated. 1365 addressEndpoint := ndp.addAndAcquireSLAACAddr(generatedAddr, true /* temporary */, stack.AddressLifetimes{ 1366 Deprecated: false, 1367 PreferredUntil: now.Add(pl), 1368 ValidUntil: now.Add(vl), 1369 }) 1370 if addressEndpoint == nil { 1371 return false 1372 } 1373 1374 state := tempSLAACAddrState{ 1375 deprecationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 1376 prefixState, ok := ndp.slaacPrefixes[prefix] 1377 if !ok { 1378 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry for %s to deprecate temporary address %s", prefix, generatedAddr)) 1379 } 1380 1381 tempAddrState, ok := prefixState.tempAddrs[generatedAddr.Address] 1382 if !ok { 1383 panic(fmt.Sprintf("ndp: must have a tempAddr entry to deprecate temporary address %s", generatedAddr)) 1384 } 1385 1386 ndp.deprecateSLAACAddress(tempAddrState.addressEndpoint) 1387 }), 1388 invalidationJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 1389 prefixState, ok := ndp.slaacPrefixes[prefix] 1390 if !ok { 1391 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry for %s to invalidate temporary address %s", prefix, generatedAddr)) 1392 } 1393 1394 tempAddrState, ok := prefixState.tempAddrs[generatedAddr.Address] 1395 if !ok { 1396 panic(fmt.Sprintf("ndp: must have a tempAddr entry to invalidate temporary address %s", generatedAddr)) 1397 } 1398 1399 ndp.invalidateTempSLAACAddr(prefixState.tempAddrs, generatedAddr.Address, tempAddrState) 1400 }), 1401 regenJob: tcpip.NewJob(ndp.ep.protocol.stack.Clock(), &ndp.ep.mu, func() { 1402 prefixState, ok := ndp.slaacPrefixes[prefix] 1403 if !ok { 1404 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry for %s to regenerate temporary address after %s", prefix, generatedAddr)) 1405 } 1406 1407 tempAddrState, ok := prefixState.tempAddrs[generatedAddr.Address] 1408 if !ok { 1409 panic(fmt.Sprintf("ndp: must have a tempAddr entry to regenerate temporary address after %s", generatedAddr)) 1410 } 1411 1412 // If an address has already been regenerated for this address, don't 1413 // regenerate another address. 1414 if tempAddrState.regenerated { 1415 return 1416 } 1417 1418 // Reset the generation attempts counter as we are starting the generation 1419 // of a new address for the SLAAC prefix. 1420 tempAddrState.regenerated = ndp.generateTempSLAACAddr(prefix, &prefixState, true /* resetGenAttempts */) 1421 prefixState.tempAddrs[generatedAddr.Address] = tempAddrState 1422 ndp.slaacPrefixes[prefix] = prefixState 1423 }), 1424 createdAt: now, 1425 addressEndpoint: addressEndpoint, 1426 } 1427 1428 state.deprecationJob.Schedule(pl) 1429 state.invalidationJob.Schedule(vl) 1430 state.regenJob.Schedule(pl - ndp.configs.RegenAdvanceDuration) 1431 1432 prefixState.generationAttempts++ 1433 prefixState.tempAddrs[generatedAddr.Address] = state 1434 1435 return true 1436 } 1437 1438 // regenerateTempSLAACAddr regenerates a temporary address for a SLAAC prefix. 1439 // 1440 // The IPv6 endpoint that ndp belongs to MUST be locked. 1441 func (ndp *ndpState) regenerateTempSLAACAddr(prefix tcpip.Subnet, resetGenAttempts bool) { 1442 state, ok := ndp.slaacPrefixes[prefix] 1443 if !ok { 1444 panic(fmt.Sprintf("ndp: SLAAC prefix state not found to regenerate temporary address for %s", prefix)) 1445 } 1446 1447 ndp.generateTempSLAACAddr(prefix, &state, resetGenAttempts) 1448 ndp.slaacPrefixes[prefix] = state 1449 } 1450 1451 // refreshSLAACPrefixLifetimes refreshes the lifetimes of a SLAAC prefix. 1452 // 1453 // pl is the new preferred lifetime. vl is the new valid lifetime. 1454 // 1455 // The IPv6 endpoint that ndp belongs to MUST be locked. 1456 func (ndp *ndpState) refreshSLAACPrefixLifetimes(prefix tcpip.Subnet, prefixState *slaacPrefixState, pl, vl time.Duration) { 1457 // If prefix was preferred for some finite lifetime before, cancel the 1458 // deprecation job so it can be reset. 1459 prefixState.deprecationJob.Cancel() 1460 1461 now := ndp.ep.protocol.stack.Clock().NowMonotonic() 1462 1463 // Schedule the deprecation job if prefix has a finite preferred lifetime. 1464 deprecated := pl == 0 1465 if pl < header.NDPInfiniteLifetime { 1466 if !deprecated { 1467 prefixState.deprecationJob.Schedule(pl) 1468 } 1469 t := now.Add(pl) 1470 prefixState.preferredUntil = &t 1471 } else { 1472 prefixState.preferredUntil = nil 1473 } 1474 1475 // As per RFC 4862 section 5.5.3.e, update the valid lifetime for prefix: 1476 // 1477 // 1) If the received Valid Lifetime is greater than 2 hours or greater than 1478 // RemainingLifetime, set the valid lifetime of the prefix to the 1479 // advertised Valid Lifetime. 1480 // 1481 // 2) If RemainingLifetime is less than or equal to 2 hours, ignore the 1482 // advertised Valid Lifetime. 1483 // 1484 // 3) Otherwise, reset the valid lifetime of the prefix to 2 hours. 1485 1486 if vl >= header.NDPInfiniteLifetime { 1487 // Handle the infinite valid lifetime separately as we do not schedule a 1488 // job in this case. 1489 prefixState.invalidationJob.Cancel() 1490 prefixState.validUntil = nil 1491 } else { 1492 var effectiveVl time.Duration 1493 var rl time.Duration 1494 1495 // If the prefix was originally set to be valid forever, assume the 1496 // remaining time to be the maximum possible value. 1497 if prefixState.validUntil == nil { 1498 rl = header.NDPInfiniteLifetime 1499 } else { 1500 rl = prefixState.validUntil.Sub(now) 1501 } 1502 1503 if vl > MinPrefixInformationValidLifetimeForUpdate || vl > rl { 1504 effectiveVl = vl 1505 } else if rl > MinPrefixInformationValidLifetimeForUpdate { 1506 effectiveVl = MinPrefixInformationValidLifetimeForUpdate 1507 } 1508 1509 if effectiveVl != 0 { 1510 prefixState.invalidationJob.Cancel() 1511 prefixState.invalidationJob.Schedule(effectiveVl) 1512 t := now.Add(effectiveVl) 1513 prefixState.validUntil = &t 1514 } 1515 } 1516 1517 // If the preferred lifetime is zero, then the prefix should be deprecated. 1518 { 1519 var preferredUntil tcpip.MonotonicTime 1520 if !deprecated { 1521 if prefixState.preferredUntil == nil { 1522 preferredUntil = tcpip.MonotonicTimeInfinite() 1523 } else { 1524 preferredUntil = *prefixState.preferredUntil 1525 } 1526 } 1527 validUntil := tcpip.MonotonicTimeInfinite() 1528 if prefixState.validUntil != nil { 1529 validUntil = *prefixState.validUntil 1530 } 1531 if addressEndpoint := prefixState.stableAddr.addressEndpoint; !addressEndpoint.Deprecated() && deprecated { 1532 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1533 ndpDisp.OnAutoGenAddressDeprecated(ndp.ep.nic.ID(), addressEndpoint.AddressWithPrefix()) 1534 } 1535 } 1536 prefixState.stableAddr.addressEndpoint.SetLifetimes(stack.AddressLifetimes{ 1537 Deprecated: deprecated, 1538 PreferredUntil: preferredUntil, 1539 ValidUntil: validUntil, 1540 }) 1541 } 1542 1543 // If DAD is not yet complete on the stable address, there is no need to do 1544 // work with temporary addresses. 1545 if prefixState.stableAddr.addressEndpoint.GetKind() != stack.Permanent { 1546 return 1547 } 1548 1549 // Note, we do not need to update the entries in the temporary address map 1550 // after updating the jobs because the jobs are held as pointers. 1551 var regenForAddr tcpip.Address 1552 allAddressesRegenerated := true 1553 for tempAddr, tempAddrState := range prefixState.tempAddrs { 1554 // As per RFC 4941 section 3.3 step 4, the valid lifetime of a temporary 1555 // address is the lower of the valid lifetime of the stable address or the 1556 // maximum temporary address valid lifetime. Note, the valid lifetime of a 1557 // temporary address is relative to the address's creation time. 1558 validUntil := tempAddrState.createdAt.Add(ndp.configs.MaxTempAddrValidLifetime) 1559 if prefixState.validUntil != nil && prefixState.validUntil.Before(validUntil) { 1560 validUntil = *prefixState.validUntil 1561 } 1562 1563 // If the address is no longer valid, invalidate it immediately. Otherwise, 1564 // reset the invalidation job. 1565 newValidLifetime := validUntil.Sub(now) 1566 if newValidLifetime <= 0 { 1567 ndp.invalidateTempSLAACAddr(prefixState.tempAddrs, tempAddr, tempAddrState) 1568 continue 1569 } 1570 tempAddrState.invalidationJob.Cancel() 1571 tempAddrState.invalidationJob.Schedule(newValidLifetime) 1572 1573 // As per RFC 4941 section 3.3 step 4, the preferred lifetime of a temporary 1574 // address is the lower of the preferred lifetime of the stable address or 1575 // the maximum temporary address preferred lifetime - the temporary address 1576 // desync factor. Note, the preferred lifetime of a temporary address is 1577 // relative to the address's creation time. 1578 preferredUntil := tempAddrState.createdAt.Add(ndp.configs.MaxTempAddrPreferredLifetime - ndp.temporaryAddressDesyncFactor) 1579 if prefixState.preferredUntil != nil && prefixState.preferredUntil.Before(preferredUntil) { 1580 preferredUntil = *prefixState.preferredUntil 1581 } 1582 1583 // If the address is no longer preferred, deprecate it immediately. 1584 // Otherwise, schedule the deprecation job again. 1585 newPreferredLifetime := preferredUntil.Sub(now) 1586 tempAddrState.deprecationJob.Cancel() 1587 deprecated := newPreferredLifetime <= 0 1588 if !deprecated { 1589 tempAddrState.deprecationJob.Schedule(newPreferredLifetime) 1590 } 1591 1592 if addressEndpoint := tempAddrState.addressEndpoint; !addressEndpoint.Deprecated() && deprecated { 1593 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1594 ndpDisp.OnAutoGenAddressDeprecated(ndp.ep.nic.ID(), addressEndpoint.AddressWithPrefix()) 1595 } 1596 } 1597 tempAddrState.addressEndpoint.SetLifetimes(stack.AddressLifetimes{ 1598 Deprecated: deprecated, 1599 ValidUntil: validUntil, 1600 PreferredUntil: preferredUntil, 1601 }) 1602 1603 tempAddrState.regenJob.Cancel() 1604 if tempAddrState.regenerated { 1605 } else { 1606 allAddressesRegenerated = false 1607 1608 if newPreferredLifetime <= ndp.configs.RegenAdvanceDuration { 1609 // The new preferred lifetime is less than the advance regeneration 1610 // duration so regenerate an address for this temporary address 1611 // immediately after we finish iterating over the temporary addresses. 1612 regenForAddr = tempAddr 1613 } else { 1614 tempAddrState.regenJob.Schedule(newPreferredLifetime - ndp.configs.RegenAdvanceDuration) 1615 } 1616 } 1617 } 1618 1619 // Generate a new temporary address if all of the existing temporary addresses 1620 // have been regenerated, or we need to immediately regenerate an address 1621 // due to an update in preferred lifetime. 1622 // 1623 // If each temporary address has already been regenerated, no new temporary 1624 // address is generated. To ensure continuation of temporary SLAAC addresses, 1625 // we manually try to regenerate an address here. 1626 if regenForAddr.BitLen() != 0 || allAddressesRegenerated { 1627 // Reset the generation attempts counter as we are starting the generation 1628 // of a new address for the SLAAC prefix. 1629 if state, ok := prefixState.tempAddrs[regenForAddr]; ndp.generateTempSLAACAddr(prefix, prefixState, true /* resetGenAttempts */) && ok { 1630 state.regenerated = true 1631 prefixState.tempAddrs[regenForAddr] = state 1632 } 1633 } 1634 } 1635 1636 // deprecateSLAACAddress marks the address as deprecated and notifies the NDP 1637 // dispatcher that address has been deprecated. 1638 // 1639 // deprecateSLAACAddress does nothing if the address is already deprecated. 1640 // 1641 // The IPv6 endpoint that ndp belongs to MUST be locked. 1642 func (ndp *ndpState) deprecateSLAACAddress(addressEndpoint stack.AddressEndpoint) { 1643 if addressEndpoint.Deprecated() { 1644 return 1645 } 1646 1647 addressEndpoint.SetDeprecated(true) 1648 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1649 ndpDisp.OnAutoGenAddressDeprecated(ndp.ep.nic.ID(), addressEndpoint.AddressWithPrefix()) 1650 } 1651 } 1652 1653 // invalidateSLAACPrefix invalidates a SLAAC prefix. 1654 // 1655 // The IPv6 endpoint that ndp belongs to MUST be locked. 1656 func (ndp *ndpState) invalidateSLAACPrefix(prefix tcpip.Subnet, state slaacPrefixState) { 1657 ndp.cleanupSLAACPrefixResources(prefix, state) 1658 1659 if addressEndpoint := state.stableAddr.addressEndpoint; addressEndpoint != nil { 1660 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1661 ndpDisp.OnAutoGenAddressInvalidated(ndp.ep.nic.ID(), addressEndpoint.AddressWithPrefix()) 1662 } 1663 1664 if err := ndp.ep.removePermanentEndpointInnerLocked(addressEndpoint, stack.AddressRemovalInvalidated, &stack.DADAborted{}); err != nil { 1665 panic(fmt.Sprintf("ndp: error removing stable SLAAC address %s: %s", addressEndpoint.AddressWithPrefix(), err)) 1666 } 1667 } 1668 } 1669 1670 // cleanupSLAACAddrResourcesAndNotify cleans up an invalidated SLAAC address's 1671 // resources. 1672 // 1673 // The IPv6 endpoint that ndp belongs to MUST be locked. 1674 func (ndp *ndpState) cleanupSLAACAddrResourcesAndNotify(addr tcpip.AddressWithPrefix, invalidatePrefix bool) { 1675 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1676 ndpDisp.OnAutoGenAddressInvalidated(ndp.ep.nic.ID(), addr) 1677 } 1678 1679 prefix := addr.Subnet() 1680 state, ok := ndp.slaacPrefixes[prefix] 1681 if !ok || state.stableAddr.addressEndpoint == nil || addr.Address != state.stableAddr.addressEndpoint.AddressWithPrefix().Address { 1682 return 1683 } 1684 1685 if !invalidatePrefix { 1686 // If the prefix is not being invalidated, disassociate the address from the 1687 // prefix and do nothing further. 1688 state.stableAddr.addressEndpoint.DecRef() 1689 state.stableAddr.addressEndpoint = nil 1690 ndp.slaacPrefixes[prefix] = state 1691 return 1692 } 1693 1694 ndp.cleanupSLAACPrefixResources(prefix, state) 1695 } 1696 1697 // cleanupSLAACPrefixResources cleans up a SLAAC prefix's jobs and entry. 1698 // 1699 // Panics if the SLAAC prefix is not known. 1700 // 1701 // The IPv6 endpoint that ndp belongs to MUST be locked. 1702 func (ndp *ndpState) cleanupSLAACPrefixResources(prefix tcpip.Subnet, state slaacPrefixState) { 1703 // Invalidate all temporary addresses. 1704 for tempAddr, tempAddrState := range state.tempAddrs { 1705 ndp.invalidateTempSLAACAddr(state.tempAddrs, tempAddr, tempAddrState) 1706 } 1707 1708 if state.stableAddr.addressEndpoint != nil { 1709 state.stableAddr.addressEndpoint.DecRef() 1710 state.stableAddr.addressEndpoint = nil 1711 } 1712 state.deprecationJob.Cancel() 1713 state.invalidationJob.Cancel() 1714 delete(ndp.slaacPrefixes, prefix) 1715 } 1716 1717 // invalidateTempSLAACAddr invalidates a temporary SLAAC address. 1718 // 1719 // The IPv6 endpoint that ndp belongs to MUST be locked. 1720 func (ndp *ndpState) invalidateTempSLAACAddr(tempAddrs map[tcpip.Address]tempSLAACAddrState, tempAddr tcpip.Address, tempAddrState tempSLAACAddrState) { 1721 ndp.cleanupTempSLAACAddrResourcesAndNotifyInner(tempAddrs, tempAddr, tempAddrState) 1722 1723 if err := ndp.ep.removePermanentEndpointInnerLocked(tempAddrState.addressEndpoint, stack.AddressRemovalInvalidated, &stack.DADAborted{}); err != nil { 1724 panic(fmt.Sprintf("error removing temporary SLAAC address %s: %s", tempAddrState.addressEndpoint.AddressWithPrefix(), err)) 1725 } 1726 } 1727 1728 // cleanupTempSLAACAddrResourcesAndNotify cleans up an invalidated temporary 1729 // SLAAC address's resources from ndp and notifies the NDP dispatcher that the 1730 // address was invalidated. 1731 // 1732 // The IPv6 endpoint that ndp belongs to MUST be locked. 1733 func (ndp *ndpState) cleanupTempSLAACAddrResourcesAndNotify(addr tcpip.AddressWithPrefix) { 1734 prefix := addr.Subnet() 1735 state, ok := ndp.slaacPrefixes[prefix] 1736 if !ok { 1737 panic(fmt.Sprintf("ndp: must have a slaacPrefixes entry to clean up temp addr %s resources", addr)) 1738 } 1739 1740 tempAddrState, ok := state.tempAddrs[addr.Address] 1741 if !ok { 1742 panic(fmt.Sprintf("ndp: must have a tempAddr entry to clean up temp addr %s resources", addr)) 1743 } 1744 1745 ndp.cleanupTempSLAACAddrResourcesAndNotifyInner(state.tempAddrs, addr.Address, tempAddrState) 1746 } 1747 1748 // cleanupTempSLAACAddrResourcesAndNotifyInner is like 1749 // cleanupTempSLAACAddrResourcesAndNotify except it does not lookup the 1750 // temporary address's state in ndp - it assumes the passed state is valid. 1751 // 1752 // The IPv6 endpoint that ndp belongs to MUST be locked. 1753 func (ndp *ndpState) cleanupTempSLAACAddrResourcesAndNotifyInner(tempAddrs map[tcpip.Address]tempSLAACAddrState, tempAddr tcpip.Address, tempAddrState tempSLAACAddrState) { 1754 if ndpDisp := ndp.ep.protocol.options.NDPDisp; ndpDisp != nil { 1755 ndpDisp.OnAutoGenAddressInvalidated(ndp.ep.nic.ID(), tempAddrState.addressEndpoint.AddressWithPrefix()) 1756 } 1757 1758 tempAddrState.addressEndpoint.DecRef() 1759 tempAddrState.addressEndpoint = nil 1760 tempAddrState.deprecationJob.Cancel() 1761 tempAddrState.invalidationJob.Cancel() 1762 tempAddrState.regenJob.Cancel() 1763 delete(tempAddrs, tempAddr) 1764 } 1765 1766 // cleanupState cleans up ndp's state. 1767 // 1768 // This function invalidates all discovered on-link prefixes, discovered 1769 // routers, and auto-generated addresses. 1770 // 1771 // The IPv6 endpoint that ndp belongs to MUST be locked. 1772 func (ndp *ndpState) cleanupState() { 1773 for prefix, state := range ndp.slaacPrefixes { 1774 ndp.invalidateSLAACPrefix(prefix, state) 1775 } 1776 1777 for prefix := range ndp.onLinkPrefixes { 1778 ndp.invalidateOnLinkPrefix(prefix) 1779 } 1780 1781 if got := len(ndp.onLinkPrefixes); got != 0 { 1782 panic(fmt.Sprintf("ndp: still have discovered on-link prefixes after cleaning up; found = %d", got)) 1783 } 1784 1785 for route := range ndp.offLinkRoutes { 1786 ndp.invalidateOffLinkRoute(route) 1787 } 1788 1789 if got := len(ndp.offLinkRoutes); got != 0 { 1790 panic(fmt.Sprintf("ndp: still have discovered off-link routes after cleaning up; found = %d", got)) 1791 } 1792 1793 ndp.dhcpv6Configuration = 0 1794 } 1795 1796 // startSolicitingRouters starts soliciting routers, as per RFC 4861 section 1797 // 6.3.7. If routers are already being solicited, this function does nothing. 1798 // 1799 // If ndp is not configured to handle Router Advertisements, routers will not 1800 // be solicited as there is no point soliciting routers if we don't handle their 1801 // advertisements. 1802 // 1803 // The IPv6 endpoint that ndp belongs to MUST be locked. 1804 func (ndp *ndpState) startSolicitingRouters() { 1805 if ndp.rtrSolicitTimer.timer != nil { 1806 // We are already soliciting routers. 1807 return 1808 } 1809 1810 remaining := ndp.configs.MaxRtrSolicitations 1811 if remaining == 0 { 1812 return 1813 } 1814 1815 if !ndp.configs.HandleRAs.enabled(ndp.ep.Forwarding()) { 1816 return 1817 } 1818 1819 // Calculate the random delay before sending our first RS, as per RFC 1820 // 4861 section 6.3.7. 1821 var delay time.Duration 1822 if ndp.configs.MaxRtrSolicitationDelay > 0 { 1823 delay = time.Duration(ndp.ep.protocol.stack.InsecureRNG().Int63n(int64(ndp.configs.MaxRtrSolicitationDelay))) 1824 } 1825 1826 // Protected by ndp.ep.mu. 1827 done := false 1828 1829 ndp.rtrSolicitTimer = timer{ 1830 done: &done, 1831 timer: ndp.ep.protocol.stack.Clock().AfterFunc(delay, func() { 1832 // As per RFC 4861 section 4.1: 1833 // 1834 // IP Fields: 1835 // Source Address 1836 // An IP address assigned to the sending interface, or 1837 // the unspecified address if no address is assigned 1838 // to the sending interface. 1839 localAddr := header.IPv6Any 1840 if addressEndpoint := ndp.ep.AcquireOutgoingPrimaryAddress(header.IPv6AllRoutersLinkLocalMulticastAddress, tcpip.Address{} /* srcHint */, false); addressEndpoint != nil { 1841 localAddr = addressEndpoint.AddressWithPrefix().Address 1842 addressEndpoint.DecRef() 1843 } 1844 1845 // As per RFC 4861 section 4.1, an NDP RS SHOULD include the source 1846 // link-layer address option if the source address of the NDP RS is 1847 // specified. This option MUST NOT be included if the source address is 1848 // unspecified. 1849 // 1850 // TODO(b/141011931): Validate a LinkEndpoint's link address (provided by 1851 // LinkEndpoint.LinkAddress) before reaching this point. 1852 var optsSerializer header.NDPOptionsSerializer 1853 linkAddress := ndp.ep.nic.LinkAddress() 1854 if localAddr != header.IPv6Any && header.IsValidUnicastEthernetAddress(linkAddress) { 1855 optsSerializer = header.NDPOptionsSerializer{ 1856 header.NDPSourceLinkLayerAddressOption(linkAddress), 1857 } 1858 } 1859 payloadSize := header.ICMPv6HeaderSize + header.NDPRSMinimumSize + optsSerializer.Length() 1860 icmpView := buffer.NewView(payloadSize) 1861 icmpView.Grow(payloadSize) 1862 icmpData := header.ICMPv6(icmpView.AsSlice()) 1863 icmpData.SetType(header.ICMPv6RouterSolicit) 1864 rs := header.NDPRouterSolicit(icmpData.MessageBody()) 1865 rs.Options().Serialize(optsSerializer) 1866 icmpData.SetChecksum(header.ICMPv6Checksum(header.ICMPv6ChecksumParams{ 1867 Header: icmpData, 1868 Src: localAddr, 1869 Dst: header.IPv6AllRoutersLinkLocalMulticastAddress, 1870 })) 1871 1872 pkt := stack.NewPacketBuffer(stack.PacketBufferOptions{ 1873 ReserveHeaderBytes: int(ndp.ep.MaxHeaderLength()), 1874 Payload: buffer.MakeWithView(icmpView), 1875 }) 1876 defer pkt.DecRef() 1877 1878 sent := ndp.ep.stats.icmp.packetsSent 1879 if err := addIPHeader(localAddr, header.IPv6AllRoutersLinkLocalMulticastAddress, pkt, stack.NetworkHeaderParams{ 1880 Protocol: header.ICMPv6ProtocolNumber, 1881 TTL: header.NDPHopLimit, 1882 }, nil /* extensionHeaders */); err != nil { 1883 panic(fmt.Sprintf("failed to add IP header: %s", err)) 1884 } 1885 1886 if err := ndp.ep.nic.WritePacketToRemote(header.EthernetAddressFromMulticastIPv6Address(header.IPv6AllRoutersLinkLocalMulticastAddress), pkt); err != nil { 1887 sent.dropped.Increment() 1888 // Don't send any more messages if we had an error. 1889 remaining = 0 1890 } else { 1891 sent.routerSolicit.Increment() 1892 remaining-- 1893 } 1894 1895 ndp.ep.mu.Lock() 1896 defer ndp.ep.mu.Unlock() 1897 1898 if done { 1899 // Router solicitation was stopped. 1900 return 1901 } 1902 1903 if remaining == 0 { 1904 // We are done soliciting routers. 1905 ndp.stopSolicitingRouters() 1906 return 1907 } 1908 1909 ndp.rtrSolicitTimer.timer.Reset(ndp.configs.RtrSolicitationInterval) 1910 }), 1911 } 1912 } 1913 1914 // forwardingChanged handles a change in forwarding configuration. 1915 // 1916 // If transitioning to a host, router solicitation will be started. Otherwise, 1917 // router solicitation will be stopped if NDP is not configured to handle RAs 1918 // as a router. 1919 // 1920 // Precondition: ndp.ep.mu must be locked. 1921 func (ndp *ndpState) forwardingChanged(forwarding bool) { 1922 if forwarding { 1923 if ndp.configs.HandleRAs.enabled(forwarding) { 1924 return 1925 } 1926 1927 ndp.stopSolicitingRouters() 1928 return 1929 } 1930 1931 // Solicit routers when transitioning to a host. 1932 // 1933 // If the endpoint is not currently enabled, routers will be solicited when 1934 // the endpoint becomes enabled (if it is still a host). 1935 if ndp.ep.Enabled() { 1936 ndp.startSolicitingRouters() 1937 } 1938 } 1939 1940 // stopSolicitingRouters stops soliciting routers. If routers are not currently 1941 // being solicited, this function does nothing. 1942 // 1943 // The IPv6 endpoint that ndp belongs to MUST be locked. 1944 func (ndp *ndpState) stopSolicitingRouters() { 1945 if ndp.rtrSolicitTimer.timer == nil { 1946 // Nothing to do. 1947 return 1948 } 1949 1950 ndp.rtrSolicitTimer.timer.Stop() 1951 *ndp.rtrSolicitTimer.done = true 1952 ndp.rtrSolicitTimer = timer{} 1953 } 1954 1955 func (ndp *ndpState) init(ep *endpoint, dadOptions ip.DADOptions) { 1956 if ndp.offLinkRoutes != nil { 1957 panic("attempted to initialize NDP state twice") 1958 } 1959 1960 ndp.ep = ep 1961 ndp.configs = ep.protocol.options.NDPConfigs 1962 ndp.dad.Init(&ndp.ep.mu, ep.protocol.options.DADConfigs, dadOptions) 1963 ndp.offLinkRoutes = make(map[offLinkRoute]offLinkRouteState) 1964 ndp.onLinkPrefixes = make(map[tcpip.Subnet]onLinkPrefixState) 1965 ndp.slaacPrefixes = make(map[tcpip.Subnet]slaacPrefixState) 1966 1967 header.InitialTempIID(ndp.temporaryIIDHistory[:], ndp.ep.protocol.options.TempIIDSeed, ndp.ep.nic.ID()) 1968 ndp.temporaryAddressDesyncFactor = time.Duration(ep.protocol.stack.InsecureRNG().Int63n(int64(MaxDesyncFactor))) 1969 } 1970 1971 func (ndp *ndpState) SendDADMessage(addr tcpip.Address, nonce []byte) tcpip.Error { 1972 snmc := header.SolicitedNodeAddr(addr) 1973 return ndp.ep.sendNDPNS(header.IPv6Any, snmc, addr, header.EthernetAddressFromMulticastIPv6Address(snmc), header.NDPOptionsSerializer{ 1974 header.NDPNonceOption(nonce), 1975 }) 1976 } 1977 1978 func (e *endpoint) sendNDPNS(srcAddr, dstAddr, targetAddr tcpip.Address, remoteLinkAddr tcpip.LinkAddress, opts header.NDPOptionsSerializer) tcpip.Error { 1979 icmpView := buffer.NewView(header.ICMPv6NeighborSolicitMinimumSize + opts.Length()) 1980 icmpView.Grow(header.ICMPv6NeighborSolicitMinimumSize + opts.Length()) 1981 icmp := header.ICMPv6(icmpView.AsSlice()) 1982 icmp.SetType(header.ICMPv6NeighborSolicit) 1983 ns := header.NDPNeighborSolicit(icmp.MessageBody()) 1984 ns.SetTargetAddress(targetAddr) 1985 ns.Options().Serialize(opts) 1986 icmp.SetChecksum(header.ICMPv6Checksum(header.ICMPv6ChecksumParams{ 1987 Header: icmp, 1988 Src: srcAddr, 1989 Dst: dstAddr, 1990 })) 1991 1992 pkt := stack.NewPacketBuffer(stack.PacketBufferOptions{ 1993 ReserveHeaderBytes: int(e.MaxHeaderLength()), 1994 Payload: buffer.MakeWithView(icmpView), 1995 }) 1996 defer pkt.DecRef() 1997 1998 if err := addIPHeader(srcAddr, dstAddr, pkt, stack.NetworkHeaderParams{ 1999 Protocol: header.ICMPv6ProtocolNumber, 2000 TTL: header.NDPHopLimit, 2001 }, nil /* extensionHeaders */); err != nil { 2002 panic(fmt.Sprintf("failed to add IP header: %s", err)) 2003 } 2004 2005 sent := e.stats.icmp.packetsSent 2006 err := e.nic.WritePacketToRemote(remoteLinkAddr, pkt) 2007 if err != nil { 2008 sent.dropped.Increment() 2009 } else { 2010 sent.neighborSolicit.Increment() 2011 } 2012 return err 2013 }