icmp.rs 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123
  1. use core::cmp;
  2. #[cfg(feature = "async")]
  3. use core::task::Waker;
  4. use crate::phy::ChecksumCapabilities;
  5. #[cfg(feature = "async")]
  6. use crate::socket::WakerRegistration;
  7. use crate::socket::{Context, PollAt};
  8. use crate::storage::Empty;
  9. use crate::wire::IcmpRepr;
  10. #[cfg(feature = "proto-ipv4")]
  11. use crate::wire::{Icmpv4Packet, Icmpv4Repr, Ipv4Repr};
  12. #[cfg(feature = "proto-ipv6")]
  13. use crate::wire::{Icmpv6Packet, Icmpv6Repr, Ipv6Repr};
  14. use crate::wire::{IpAddress, IpListenEndpoint, IpProtocol, IpRepr};
  15. use crate::wire::{UdpPacket, UdpRepr};
  16. /// Error returned by [`Socket::bind`]
  17. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  18. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  19. pub enum BindError {
  20. InvalidState,
  21. Unaddressable,
  22. }
  23. /// Error returned by [`Socket::send`]
  24. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  25. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  26. pub enum SendError {
  27. Unaddressable,
  28. BufferFull,
  29. }
  30. /// Error returned by [`Socket::recv`]
  31. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  32. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  33. pub enum RecvError {
  34. Exhausted,
  35. }
  36. /// Type of endpoint to bind the ICMP socket to. See [IcmpSocket::bind] for
  37. /// more details.
  38. ///
  39. /// [IcmpSocket::bind]: struct.IcmpSocket.html#method.bind
  40. #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Clone, Copy)]
  41. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  42. pub enum Endpoint {
  43. Unspecified,
  44. Ident(u16),
  45. Udp(IpListenEndpoint),
  46. }
  47. impl Endpoint {
  48. pub fn is_specified(&self) -> bool {
  49. match *self {
  50. Endpoint::Ident(_) => true,
  51. Endpoint::Udp(endpoint) => endpoint.port != 0,
  52. Endpoint::Unspecified => false,
  53. }
  54. }
  55. }
  56. impl Default for Endpoint {
  57. fn default() -> Endpoint {
  58. Endpoint::Unspecified
  59. }
  60. }
  61. /// An ICMP packet metadata.
  62. pub type PacketMetadata = crate::storage::PacketMetadata<IpAddress>;
  63. /// An ICMP packet ring buffer.
  64. pub type PacketBuffer<'a> = crate::storage::PacketBuffer<'a, IpAddress>;
  65. /// A ICMP socket
  66. ///
  67. /// An ICMP socket is bound to a specific [IcmpEndpoint] which may
  68. /// be a specific UDP port to listen for ICMP error messages related
  69. /// to the port or a specific ICMP identifier value. See [bind] for
  70. /// more details.
  71. ///
  72. /// [IcmpEndpoint]: enum.IcmpEndpoint.html
  73. /// [bind]: #method.bind
  74. #[derive(Debug)]
  75. pub struct Socket<'a> {
  76. rx_buffer: PacketBuffer<'a>,
  77. tx_buffer: PacketBuffer<'a>,
  78. /// The endpoint this socket is communicating with
  79. endpoint: Endpoint,
  80. /// The time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  81. hop_limit: Option<u8>,
  82. #[cfg(feature = "async")]
  83. rx_waker: WakerRegistration,
  84. #[cfg(feature = "async")]
  85. tx_waker: WakerRegistration,
  86. }
  87. impl<'a> Socket<'a> {
  88. /// Create an ICMP socket with the given buffers.
  89. pub fn new(rx_buffer: PacketBuffer<'a>, tx_buffer: PacketBuffer<'a>) -> Socket<'a> {
  90. Socket {
  91. rx_buffer: rx_buffer,
  92. tx_buffer: tx_buffer,
  93. endpoint: Default::default(),
  94. hop_limit: None,
  95. #[cfg(feature = "async")]
  96. rx_waker: WakerRegistration::new(),
  97. #[cfg(feature = "async")]
  98. tx_waker: WakerRegistration::new(),
  99. }
  100. }
  101. /// Register a waker for receive operations.
  102. ///
  103. /// The waker is woken on state changes that might affect the return value
  104. /// of `recv` method calls, such as receiving data, or the socket closing.
  105. ///
  106. /// Notes:
  107. ///
  108. /// - Only one waker can be registered at a time. If another waker was previously registered,
  109. /// it is overwritten and will no longer be woken.
  110. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  111. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `recv` has
  112. /// necessarily changed.
  113. #[cfg(feature = "async")]
  114. pub fn register_recv_waker(&mut self, waker: &Waker) {
  115. self.rx_waker.register(waker)
  116. }
  117. /// Register a waker for send operations.
  118. ///
  119. /// The waker is woken on state changes that might affect the return value
  120. /// of `send` method calls, such as space becoming available in the transmit
  121. /// buffer, or the socket closing.
  122. ///
  123. /// Notes:
  124. ///
  125. /// - Only one waker can be registered at a time. If another waker was previously registered,
  126. /// it is overwritten and will no longer be woken.
  127. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  128. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `send` has
  129. /// necessarily changed.
  130. #[cfg(feature = "async")]
  131. pub fn register_send_waker(&mut self, waker: &Waker) {
  132. self.tx_waker.register(waker)
  133. }
  134. /// Return the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  135. ///
  136. /// See also the [set_hop_limit](#method.set_hop_limit) method
  137. pub fn hop_limit(&self) -> Option<u8> {
  138. self.hop_limit
  139. }
  140. /// Set the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  141. ///
  142. /// A socket without an explicitly set hop limit value uses the default [IANA recommended]
  143. /// value (64).
  144. ///
  145. /// # Panics
  146. ///
  147. /// This function panics if a hop limit value of 0 is given. See [RFC 1122 § 3.2.1.7].
  148. ///
  149. /// [IANA recommended]: https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml
  150. /// [RFC 1122 § 3.2.1.7]: https://tools.ietf.org/html/rfc1122#section-3.2.1.7
  151. pub fn set_hop_limit(&mut self, hop_limit: Option<u8>) {
  152. // A host MUST NOT send a datagram with a hop limit value of 0
  153. if let Some(0) = hop_limit {
  154. panic!("the time-to-live value of a packet must not be zero")
  155. }
  156. self.hop_limit = hop_limit
  157. }
  158. /// Bind the socket to the given endpoint.
  159. ///
  160. /// This function returns `Err(Error::Illegal)` if the socket was open
  161. /// (see [is_open](#method.is_open)), and `Err(Error::Unaddressable)`
  162. /// if `endpoint` is unspecified (see [is_specified]).
  163. ///
  164. /// # Examples
  165. ///
  166. /// ## Bind to ICMP Error messages associated with a specific UDP port:
  167. ///
  168. /// To [recv] ICMP error messages that are associated with a specific local
  169. /// UDP port, the socket may be bound to a given port using [IcmpEndpoint::Udp].
  170. /// This may be useful for applications using UDP attempting to detect and/or
  171. /// diagnose connection problems.
  172. ///
  173. /// ```
  174. /// use smoltcp::wire::IpListenEndpoint;
  175. /// use smoltcp::socket::icmp;
  176. /// # let rx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
  177. /// # let tx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
  178. ///
  179. /// let mut icmp_socket = // ...
  180. /// # icmp::Socket::new(rx_buffer, tx_buffer);
  181. ///
  182. /// // Bind to ICMP error responses for UDP packets sent from port 53.
  183. /// let endpoint = IpListenEndpoint::from(53);
  184. /// icmp_socket.bind(icmp::Endpoint::Udp(endpoint)).unwrap();
  185. /// ```
  186. ///
  187. /// ## Bind to a specific ICMP identifier:
  188. ///
  189. /// To [send] and [recv] ICMP packets that are not associated with a specific UDP
  190. /// port, the socket may be bound to a specific ICMP identifier using
  191. /// [IcmpEndpoint::Ident]. This is useful for sending and receiving Echo Request/Reply
  192. /// messages.
  193. ///
  194. /// ```
  195. /// use smoltcp::wire::IpListenEndpoint;
  196. /// use smoltcp::socket::icmp;
  197. /// # let rx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
  198. /// # let tx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
  199. ///
  200. /// let mut icmp_socket = // ...
  201. /// # icmp::Socket::new(rx_buffer, tx_buffer);
  202. ///
  203. /// // Bind to ICMP messages with the ICMP identifier 0x1234
  204. /// icmp_socket.bind(icmp::Endpoint::Ident(0x1234)).unwrap();
  205. /// ```
  206. ///
  207. /// [is_specified]: enum.IcmpEndpoint.html#method.is_specified
  208. /// [IcmpEndpoint::Ident]: enum.IcmpEndpoint.html#variant.Ident
  209. /// [IcmpEndpoint::Udp]: enum.IcmpEndpoint.html#variant.Udp
  210. /// [send]: #method.send
  211. /// [recv]: #method.recv
  212. pub fn bind<T: Into<Endpoint>>(&mut self, endpoint: T) -> Result<(), BindError> {
  213. let endpoint = endpoint.into();
  214. if !endpoint.is_specified() {
  215. return Err(BindError::Unaddressable);
  216. }
  217. if self.is_open() {
  218. return Err(BindError::InvalidState);
  219. }
  220. self.endpoint = endpoint;
  221. #[cfg(feature = "async")]
  222. {
  223. self.rx_waker.wake();
  224. self.tx_waker.wake();
  225. }
  226. Ok(())
  227. }
  228. /// Check whether the transmit buffer is full.
  229. #[inline]
  230. pub fn can_send(&self) -> bool {
  231. !self.tx_buffer.is_full()
  232. }
  233. /// Check whether the receive buffer is not empty.
  234. #[inline]
  235. pub fn can_recv(&self) -> bool {
  236. !self.rx_buffer.is_empty()
  237. }
  238. /// Return the maximum number packets the socket can receive.
  239. #[inline]
  240. pub fn packet_recv_capacity(&self) -> usize {
  241. self.rx_buffer.packet_capacity()
  242. }
  243. /// Return the maximum number packets the socket can transmit.
  244. #[inline]
  245. pub fn packet_send_capacity(&self) -> usize {
  246. self.tx_buffer.packet_capacity()
  247. }
  248. /// Return the maximum number of bytes inside the recv buffer.
  249. #[inline]
  250. pub fn payload_recv_capacity(&self) -> usize {
  251. self.rx_buffer.payload_capacity()
  252. }
  253. /// Return the maximum number of bytes inside the transmit buffer.
  254. #[inline]
  255. pub fn payload_send_capacity(&self) -> usize {
  256. self.tx_buffer.payload_capacity()
  257. }
  258. /// Check whether the socket is open.
  259. #[inline]
  260. pub fn is_open(&self) -> bool {
  261. self.endpoint != Endpoint::Unspecified
  262. }
  263. /// Enqueue a packet to be sent to a given remote address, and return a pointer
  264. /// to its payload.
  265. ///
  266. /// This function returns `Err(Error::Exhausted)` if the transmit buffer is full,
  267. /// `Err(Error::Truncated)` if the requested size is larger than the packet buffer
  268. /// size, and `Err(Error::Unaddressable)` if the remote address is unspecified.
  269. pub fn send(&mut self, size: usize, endpoint: IpAddress) -> Result<&mut [u8], SendError> {
  270. if endpoint.is_unspecified() {
  271. return Err(SendError::Unaddressable);
  272. }
  273. let packet_buf = self
  274. .tx_buffer
  275. .enqueue(size, endpoint)
  276. .map_err(|_| SendError::BufferFull)?;
  277. net_trace!("icmp:{}: buffer to send {} octets", endpoint, size);
  278. Ok(packet_buf)
  279. }
  280. /// Enqueue a packet to be send to a given remote address and pass the buffer
  281. /// to the provided closure. The closure then returns the size of the data written
  282. /// into the buffer.
  283. ///
  284. /// Also see [send](#method.send).
  285. pub fn send_with<F>(
  286. &mut self,
  287. max_size: usize,
  288. endpoint: IpAddress,
  289. f: F,
  290. ) -> Result<usize, SendError>
  291. where
  292. F: FnOnce(&mut [u8]) -> usize,
  293. {
  294. if endpoint.is_unspecified() {
  295. return Err(SendError::Unaddressable);
  296. }
  297. let size = self
  298. .tx_buffer
  299. .enqueue_with_infallible(max_size, endpoint, f)
  300. .map_err(|_| SendError::BufferFull)?;
  301. net_trace!("icmp:{}: buffer to send {} octets", endpoint, size);
  302. Ok(size)
  303. }
  304. /// Enqueue a packet to be sent to a given remote address, and fill it from a slice.
  305. ///
  306. /// See also [send](#method.send).
  307. pub fn send_slice(&mut self, data: &[u8], endpoint: IpAddress) -> Result<(), SendError> {
  308. let packet_buf = self.send(data.len(), endpoint)?;
  309. packet_buf.copy_from_slice(data);
  310. Ok(())
  311. }
  312. /// Dequeue a packet received from a remote endpoint, and return the `IpAddress` as well
  313. /// as a pointer to the payload.
  314. ///
  315. /// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
  316. pub fn recv(&mut self) -> Result<(&[u8], IpAddress), RecvError> {
  317. let (endpoint, packet_buf) = self.rx_buffer.dequeue().map_err(|_| RecvError::Exhausted)?;
  318. net_trace!(
  319. "icmp:{}: receive {} buffered octets",
  320. endpoint,
  321. packet_buf.len()
  322. );
  323. Ok((packet_buf, endpoint))
  324. }
  325. /// Dequeue a packet received from a remote endpoint, copy the payload into the given slice,
  326. /// and return the amount of octets copied as well as the `IpAddress`
  327. ///
  328. /// See also [recv](#method.recv).
  329. pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<(usize, IpAddress), RecvError> {
  330. let (buffer, endpoint) = self.recv()?;
  331. let length = cmp::min(data.len(), buffer.len());
  332. data[..length].copy_from_slice(&buffer[..length]);
  333. Ok((length, endpoint))
  334. }
  335. /// Filter determining which packets received by the interface are appended to
  336. /// the given sockets received buffer.
  337. pub(crate) fn accepts(&self, cx: &mut Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) -> bool {
  338. match (&self.endpoint, icmp_repr) {
  339. // If we are bound to ICMP errors associated to a UDP port, only
  340. // accept Destination Unreachable or Time Exceeded messages with
  341. // the data containing a UDP packet send from the local port we
  342. // are bound to.
  343. #[cfg(feature = "proto-ipv4")]
  344. (
  345. &Endpoint::Udp(endpoint),
  346. &IcmpRepr::Ipv4(
  347. Icmpv4Repr::DstUnreachable { data, header, .. }
  348. | Icmpv4Repr::TimeExceeded { data, header, .. },
  349. ),
  350. ) if endpoint.addr.is_none() || endpoint.addr == Some(ip_repr.dst_addr()) => {
  351. let packet = UdpPacket::new_unchecked(data);
  352. match UdpRepr::parse(
  353. &packet,
  354. &header.src_addr.into(),
  355. &header.dst_addr.into(),
  356. &cx.checksum_caps(),
  357. ) {
  358. Ok(repr) => endpoint.port == repr.src_port,
  359. Err(_) => false,
  360. }
  361. }
  362. #[cfg(feature = "proto-ipv6")]
  363. (
  364. &Endpoint::Udp(endpoint),
  365. &IcmpRepr::Ipv6(
  366. Icmpv6Repr::DstUnreachable { data, header, .. }
  367. | Icmpv6Repr::TimeExceeded { data, header, .. },
  368. ),
  369. ) if endpoint.addr.is_none() || endpoint.addr == Some(ip_repr.dst_addr()) => {
  370. let packet = UdpPacket::new_unchecked(data);
  371. match UdpRepr::parse(
  372. &packet,
  373. &header.src_addr.into(),
  374. &header.dst_addr.into(),
  375. &cx.checksum_caps(),
  376. ) {
  377. Ok(repr) => endpoint.port == repr.src_port,
  378. Err(_) => false,
  379. }
  380. }
  381. // If we are bound to a specific ICMP identifier value, only accept an
  382. // Echo Request/Reply with the identifier field matching the endpoint
  383. // port.
  384. #[cfg(feature = "proto-ipv4")]
  385. (
  386. &Endpoint::Ident(bound_ident),
  387. &IcmpRepr::Ipv4(Icmpv4Repr::EchoRequest { ident, .. }),
  388. )
  389. | (
  390. &Endpoint::Ident(bound_ident),
  391. &IcmpRepr::Ipv4(Icmpv4Repr::EchoReply { ident, .. }),
  392. ) => ident == bound_ident,
  393. #[cfg(feature = "proto-ipv6")]
  394. (
  395. &Endpoint::Ident(bound_ident),
  396. &IcmpRepr::Ipv6(Icmpv6Repr::EchoRequest { ident, .. }),
  397. )
  398. | (
  399. &Endpoint::Ident(bound_ident),
  400. &IcmpRepr::Ipv6(Icmpv6Repr::EchoReply { ident, .. }),
  401. ) => ident == bound_ident,
  402. _ => false,
  403. }
  404. }
  405. pub(crate) fn process(&mut self, _cx: &mut Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) {
  406. match *icmp_repr {
  407. #[cfg(feature = "proto-ipv4")]
  408. IcmpRepr::Ipv4(ref icmp_repr) => {
  409. net_trace!("icmp: receiving {} octets", icmp_repr.buffer_len());
  410. match self
  411. .rx_buffer
  412. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())
  413. {
  414. Ok(packet_buf) => {
  415. icmp_repr.emit(
  416. &mut Icmpv4Packet::new_unchecked(packet_buf),
  417. &ChecksumCapabilities::default(),
  418. );
  419. }
  420. Err(_) => net_trace!("icmp: buffer full, dropped incoming packet"),
  421. }
  422. }
  423. #[cfg(feature = "proto-ipv6")]
  424. IcmpRepr::Ipv6(ref icmp_repr) => {
  425. net_trace!("icmp: receiving {} octets", icmp_repr.buffer_len());
  426. match self
  427. .rx_buffer
  428. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())
  429. {
  430. Ok(packet_buf) => icmp_repr.emit(
  431. &ip_repr.src_addr(),
  432. &ip_repr.dst_addr(),
  433. &mut Icmpv6Packet::new_unchecked(packet_buf),
  434. &ChecksumCapabilities::default(),
  435. ),
  436. Err(_) => net_trace!("icmp: buffer full, dropped incoming packet"),
  437. }
  438. }
  439. }
  440. #[cfg(feature = "async")]
  441. self.rx_waker.wake();
  442. }
  443. pub(crate) fn dispatch<F, E>(&mut self, cx: &mut Context, emit: F) -> Result<(), E>
  444. where
  445. F: FnOnce(&mut Context, (IpRepr, IcmpRepr)) -> Result<(), E>,
  446. {
  447. let hop_limit = self.hop_limit.unwrap_or(64);
  448. let res = self.tx_buffer.dequeue_with(|remote_endpoint, packet_buf| {
  449. net_trace!(
  450. "icmp:{}: sending {} octets",
  451. remote_endpoint,
  452. packet_buf.len()
  453. );
  454. match *remote_endpoint {
  455. #[cfg(feature = "proto-ipv4")]
  456. IpAddress::Ipv4(dst_addr) => {
  457. let src_addr = match cx.get_source_address_ipv4(dst_addr) {
  458. Some(addr) => addr,
  459. None => {
  460. net_trace!(
  461. "icmp:{}: not find suitable source address, dropping",
  462. remote_endpoint
  463. );
  464. return Ok(());
  465. }
  466. };
  467. let packet = Icmpv4Packet::new_unchecked(&*packet_buf);
  468. let repr = match Icmpv4Repr::parse(&packet, &ChecksumCapabilities::ignored()) {
  469. Ok(x) => x,
  470. Err(_) => {
  471. net_trace!(
  472. "icmp:{}: malformed packet in queue, dropping",
  473. remote_endpoint
  474. );
  475. return Ok(());
  476. }
  477. };
  478. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  479. src_addr,
  480. dst_addr,
  481. next_header: IpProtocol::Icmp,
  482. payload_len: repr.buffer_len(),
  483. hop_limit: hop_limit,
  484. });
  485. emit(cx, (ip_repr, IcmpRepr::Ipv4(repr)))
  486. }
  487. #[cfg(feature = "proto-ipv6")]
  488. IpAddress::Ipv6(dst_addr) => {
  489. let src_addr = match cx.get_source_address_ipv6(dst_addr) {
  490. Some(addr) => addr,
  491. None => {
  492. net_trace!(
  493. "icmp:{}: not find suitable source address, dropping",
  494. remote_endpoint
  495. );
  496. return Ok(());
  497. }
  498. };
  499. let packet = Icmpv6Packet::new_unchecked(&*packet_buf);
  500. let repr = match Icmpv6Repr::parse(
  501. &src_addr.into(),
  502. &dst_addr.into(),
  503. &packet,
  504. &ChecksumCapabilities::ignored(),
  505. ) {
  506. Ok(x) => x,
  507. Err(_) => {
  508. net_trace!(
  509. "icmp:{}: malformed packet in queue, dropping",
  510. remote_endpoint
  511. );
  512. return Ok(());
  513. }
  514. };
  515. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  516. src_addr,
  517. dst_addr,
  518. next_header: IpProtocol::Icmpv6,
  519. payload_len: repr.buffer_len(),
  520. hop_limit: hop_limit,
  521. });
  522. emit(cx, (ip_repr, IcmpRepr::Ipv6(repr)))
  523. }
  524. }
  525. });
  526. match res {
  527. Err(Empty) => Ok(()),
  528. Ok(Err(e)) => Err(e),
  529. Ok(Ok(())) => {
  530. #[cfg(feature = "async")]
  531. self.tx_waker.wake();
  532. Ok(())
  533. }
  534. }
  535. }
  536. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  537. if self.tx_buffer.is_empty() {
  538. PollAt::Ingress
  539. } else {
  540. PollAt::Now
  541. }
  542. }
  543. }
  544. #[cfg(test)]
  545. mod tests_common {
  546. pub use super::*;
  547. pub use crate::phy::DeviceCapabilities;
  548. pub use crate::wire::IpAddress;
  549. pub fn buffer(packets: usize) -> PacketBuffer<'static> {
  550. PacketBuffer::new(vec![PacketMetadata::EMPTY; packets], vec![0; 66 * packets])
  551. }
  552. pub fn socket(
  553. rx_buffer: PacketBuffer<'static>,
  554. tx_buffer: PacketBuffer<'static>,
  555. ) -> Socket<'static> {
  556. Socket::new(rx_buffer, tx_buffer)
  557. }
  558. pub const LOCAL_PORT: u16 = 53;
  559. pub static UDP_REPR: UdpRepr = UdpRepr {
  560. src_port: 53,
  561. dst_port: 9090,
  562. };
  563. pub static UDP_PAYLOAD: &[u8] = &[0xff; 10];
  564. }
  565. #[cfg(all(test, feature = "proto-ipv4"))]
  566. mod test_ipv4 {
  567. use super::tests_common::*;
  568. use crate::wire::{Icmpv4DstUnreachable, IpEndpoint, Ipv4Address};
  569. const REMOTE_IPV4: Ipv4Address = Ipv4Address([192, 168, 1, 2]);
  570. const LOCAL_IPV4: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
  571. const LOCAL_END_V4: IpEndpoint = IpEndpoint {
  572. addr: IpAddress::Ipv4(LOCAL_IPV4),
  573. port: LOCAL_PORT,
  574. };
  575. static ECHOV4_REPR: Icmpv4Repr = Icmpv4Repr::EchoRequest {
  576. ident: 0x1234,
  577. seq_no: 0x5678,
  578. data: &[0xff; 16],
  579. };
  580. static LOCAL_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  581. src_addr: LOCAL_IPV4,
  582. dst_addr: REMOTE_IPV4,
  583. next_header: IpProtocol::Icmp,
  584. payload_len: 24,
  585. hop_limit: 0x40,
  586. });
  587. static REMOTE_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  588. src_addr: REMOTE_IPV4,
  589. dst_addr: LOCAL_IPV4,
  590. next_header: IpProtocol::Icmp,
  591. payload_len: 24,
  592. hop_limit: 0x40,
  593. });
  594. #[test]
  595. fn test_send_unaddressable() {
  596. let mut socket = socket(buffer(0), buffer(1));
  597. assert_eq!(
  598. socket.send_slice(b"abcdef", IpAddress::Ipv4(Ipv4Address::default())),
  599. Err(SendError::Unaddressable)
  600. );
  601. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV4.into()), Ok(()));
  602. }
  603. #[test]
  604. fn test_send_dispatch() {
  605. let mut socket = socket(buffer(0), buffer(1));
  606. let mut cx = Context::mock();
  607. let checksum = ChecksumCapabilities::default();
  608. assert_eq!(
  609. socket.dispatch(&mut cx, |_, _| unreachable!()),
  610. Ok::<_, ()>(())
  611. );
  612. // This buffer is too long
  613. assert_eq!(
  614. socket.send_slice(&[0xff; 67], REMOTE_IPV4.into()),
  615. Err(SendError::BufferFull)
  616. );
  617. assert!(socket.can_send());
  618. let mut bytes = [0xff; 24];
  619. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  620. ECHOV4_REPR.emit(&mut packet, &checksum);
  621. assert_eq!(
  622. socket.send_slice(&*packet.into_inner(), REMOTE_IPV4.into()),
  623. Ok(())
  624. );
  625. assert_eq!(
  626. socket.send_slice(b"123456", REMOTE_IPV4.into()),
  627. Err(SendError::BufferFull)
  628. );
  629. assert!(!socket.can_send());
  630. assert_eq!(
  631. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  632. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  633. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  634. Err(())
  635. }),
  636. Err(())
  637. );
  638. // buffer is not taken off of the tx queue due to the error
  639. assert!(!socket.can_send());
  640. assert_eq!(
  641. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  642. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  643. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  644. Ok::<_, ()>(())
  645. }),
  646. Ok(())
  647. );
  648. // buffer is taken off of the queue this time
  649. assert!(socket.can_send());
  650. }
  651. #[test]
  652. fn test_set_hop_limit_v4() {
  653. let mut s = socket(buffer(0), buffer(1));
  654. let mut cx = Context::mock();
  655. let checksum = ChecksumCapabilities::default();
  656. let mut bytes = [0xff; 24];
  657. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  658. ECHOV4_REPR.emit(&mut packet, &checksum);
  659. s.set_hop_limit(Some(0x2a));
  660. assert_eq!(
  661. s.send_slice(&*packet.into_inner(), REMOTE_IPV4.into()),
  662. Ok(())
  663. );
  664. assert_eq!(
  665. s.dispatch(&mut cx, |_, (ip_repr, _)| {
  666. assert_eq!(
  667. ip_repr,
  668. IpRepr::Ipv4(Ipv4Repr {
  669. src_addr: LOCAL_IPV4,
  670. dst_addr: REMOTE_IPV4,
  671. next_header: IpProtocol::Icmp,
  672. payload_len: ECHOV4_REPR.buffer_len(),
  673. hop_limit: 0x2a,
  674. })
  675. );
  676. Ok::<_, ()>(())
  677. }),
  678. Ok(())
  679. );
  680. }
  681. #[test]
  682. fn test_recv_process() {
  683. let mut socket = socket(buffer(1), buffer(1));
  684. let mut cx = Context::mock();
  685. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  686. assert!(!socket.can_recv());
  687. assert_eq!(socket.recv(), Err(RecvError::Exhausted));
  688. let checksum = ChecksumCapabilities::default();
  689. let mut bytes = [0xff; 24];
  690. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
  691. ECHOV4_REPR.emit(&mut packet, &checksum);
  692. let data = &*packet.into_inner();
  693. assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  694. socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into());
  695. assert!(socket.can_recv());
  696. assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  697. socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into());
  698. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV4.into())));
  699. assert!(!socket.can_recv());
  700. }
  701. #[test]
  702. fn test_accept_bad_id() {
  703. let mut socket = socket(buffer(1), buffer(1));
  704. let mut cx = Context::mock();
  705. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  706. let checksum = ChecksumCapabilities::default();
  707. let mut bytes = [0xff; 20];
  708. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  709. let icmp_repr = Icmpv4Repr::EchoRequest {
  710. ident: 0x4321,
  711. seq_no: 0x5678,
  712. data: &[0xff; 16],
  713. };
  714. icmp_repr.emit(&mut packet, &checksum);
  715. // Ensure that a packet with an identifier that isn't the bound
  716. // ID is not accepted
  717. assert!(!socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &icmp_repr.into()));
  718. }
  719. #[test]
  720. fn test_accepts_udp() {
  721. let mut socket = socket(buffer(1), buffer(1));
  722. let mut cx = Context::mock();
  723. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V4.into())), Ok(()));
  724. let checksum = ChecksumCapabilities::default();
  725. let mut bytes = [0xff; 18];
  726. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  727. UDP_REPR.emit(
  728. &mut packet,
  729. &REMOTE_IPV4.into(),
  730. &LOCAL_IPV4.into(),
  731. UDP_PAYLOAD.len(),
  732. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  733. &checksum,
  734. );
  735. let data = &*packet.into_inner();
  736. let icmp_repr = Icmpv4Repr::DstUnreachable {
  737. reason: Icmpv4DstUnreachable::PortUnreachable,
  738. header: Ipv4Repr {
  739. src_addr: LOCAL_IPV4,
  740. dst_addr: REMOTE_IPV4,
  741. next_header: IpProtocol::Icmp,
  742. payload_len: 12,
  743. hop_limit: 0x40,
  744. },
  745. data: data,
  746. };
  747. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  748. src_addr: REMOTE_IPV4,
  749. dst_addr: LOCAL_IPV4,
  750. next_header: IpProtocol::Icmp,
  751. payload_len: icmp_repr.buffer_len(),
  752. hop_limit: 0x40,
  753. });
  754. assert!(!socket.can_recv());
  755. // Ensure we can accept ICMP error response to the bound
  756. // UDP port
  757. assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
  758. socket.process(&mut cx, &ip_repr, &icmp_repr.into());
  759. assert!(socket.can_recv());
  760. let mut bytes = [0x00; 46];
  761. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
  762. icmp_repr.emit(&mut packet, &checksum);
  763. assert_eq!(
  764. socket.recv(),
  765. Ok((&*packet.into_inner(), REMOTE_IPV4.into()))
  766. );
  767. assert!(!socket.can_recv());
  768. }
  769. }
  770. #[cfg(all(test, feature = "proto-ipv6"))]
  771. mod test_ipv6 {
  772. use super::tests_common::*;
  773. use crate::wire::{Icmpv6DstUnreachable, IpEndpoint, Ipv6Address};
  774. const REMOTE_IPV6: Ipv6Address =
  775. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2]);
  776. const LOCAL_IPV6: Ipv6Address =
  777. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]);
  778. const LOCAL_END_V6: IpEndpoint = IpEndpoint {
  779. addr: IpAddress::Ipv6(LOCAL_IPV6),
  780. port: LOCAL_PORT,
  781. };
  782. static ECHOV6_REPR: Icmpv6Repr = Icmpv6Repr::EchoRequest {
  783. ident: 0x1234,
  784. seq_no: 0x5678,
  785. data: &[0xff; 16],
  786. };
  787. static LOCAL_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  788. src_addr: LOCAL_IPV6,
  789. dst_addr: REMOTE_IPV6,
  790. next_header: IpProtocol::Icmpv6,
  791. payload_len: 24,
  792. hop_limit: 0x40,
  793. });
  794. static REMOTE_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  795. src_addr: REMOTE_IPV6,
  796. dst_addr: LOCAL_IPV6,
  797. next_header: IpProtocol::Icmpv6,
  798. payload_len: 24,
  799. hop_limit: 0x40,
  800. });
  801. #[test]
  802. fn test_send_unaddressable() {
  803. let mut socket = socket(buffer(0), buffer(1));
  804. assert_eq!(
  805. socket.send_slice(b"abcdef", IpAddress::Ipv6(Ipv6Address::default())),
  806. Err(SendError::Unaddressable)
  807. );
  808. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV6.into()), Ok(()));
  809. }
  810. #[test]
  811. fn test_send_dispatch() {
  812. let mut socket = socket(buffer(0), buffer(1));
  813. let mut cx = Context::mock();
  814. let checksum = ChecksumCapabilities::default();
  815. assert_eq!(
  816. socket.dispatch(&mut cx, |_, _| unreachable!()),
  817. Ok::<_, ()>(())
  818. );
  819. // This buffer is too long
  820. assert_eq!(
  821. socket.send_slice(&[0xff; 67], REMOTE_IPV6.into()),
  822. Err(SendError::BufferFull)
  823. );
  824. assert!(socket.can_send());
  825. let mut bytes = vec![0xff; 24];
  826. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  827. ECHOV6_REPR.emit(
  828. &LOCAL_IPV6.into(),
  829. &REMOTE_IPV6.into(),
  830. &mut packet,
  831. &checksum,
  832. );
  833. assert_eq!(
  834. socket.send_slice(&*packet.into_inner(), REMOTE_IPV6.into()),
  835. Ok(())
  836. );
  837. assert_eq!(
  838. socket.send_slice(b"123456", REMOTE_IPV6.into()),
  839. Err(SendError::BufferFull)
  840. );
  841. assert!(!socket.can_send());
  842. assert_eq!(
  843. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  844. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  845. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  846. Err(())
  847. }),
  848. Err(())
  849. );
  850. // buffer is not taken off of the tx queue due to the error
  851. assert!(!socket.can_send());
  852. assert_eq!(
  853. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  854. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  855. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  856. Ok::<_, ()>(())
  857. }),
  858. Ok(())
  859. );
  860. // buffer is taken off of the queue this time
  861. assert!(socket.can_send());
  862. }
  863. #[test]
  864. fn test_set_hop_limit() {
  865. let mut s = socket(buffer(0), buffer(1));
  866. let mut cx = Context::mock();
  867. let checksum = ChecksumCapabilities::default();
  868. let mut bytes = vec![0xff; 24];
  869. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  870. ECHOV6_REPR.emit(
  871. &LOCAL_IPV6.into(),
  872. &REMOTE_IPV6.into(),
  873. &mut packet,
  874. &checksum,
  875. );
  876. s.set_hop_limit(Some(0x2a));
  877. assert_eq!(
  878. s.send_slice(&*packet.into_inner(), REMOTE_IPV6.into()),
  879. Ok(())
  880. );
  881. assert_eq!(
  882. s.dispatch(&mut cx, |_, (ip_repr, _)| {
  883. assert_eq!(
  884. ip_repr,
  885. IpRepr::Ipv6(Ipv6Repr {
  886. src_addr: LOCAL_IPV6,
  887. dst_addr: REMOTE_IPV6,
  888. next_header: IpProtocol::Icmpv6,
  889. payload_len: ECHOV6_REPR.buffer_len(),
  890. hop_limit: 0x2a,
  891. })
  892. );
  893. Ok::<_, ()>(())
  894. }),
  895. Ok(())
  896. );
  897. }
  898. #[test]
  899. fn test_recv_process() {
  900. let mut socket = socket(buffer(1), buffer(1));
  901. let mut cx = Context::mock();
  902. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  903. assert!(!socket.can_recv());
  904. assert_eq!(socket.recv(), Err(RecvError::Exhausted));
  905. let checksum = ChecksumCapabilities::default();
  906. let mut bytes = [0xff; 24];
  907. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
  908. ECHOV6_REPR.emit(
  909. &LOCAL_IPV6.into(),
  910. &REMOTE_IPV6.into(),
  911. &mut packet,
  912. &checksum,
  913. );
  914. let data = &*packet.into_inner();
  915. assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  916. socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into());
  917. assert!(socket.can_recv());
  918. assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  919. socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into());
  920. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV6.into())));
  921. assert!(!socket.can_recv());
  922. }
  923. #[test]
  924. fn test_accept_bad_id() {
  925. let mut socket = socket(buffer(1), buffer(1));
  926. let mut cx = Context::mock();
  927. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  928. let checksum = ChecksumCapabilities::default();
  929. let mut bytes = [0xff; 20];
  930. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  931. let icmp_repr = Icmpv6Repr::EchoRequest {
  932. ident: 0x4321,
  933. seq_no: 0x5678,
  934. data: &[0xff; 16],
  935. };
  936. icmp_repr.emit(
  937. &LOCAL_IPV6.into(),
  938. &REMOTE_IPV6.into(),
  939. &mut packet,
  940. &checksum,
  941. );
  942. // Ensure that a packet with an identifier that isn't the bound
  943. // ID is not accepted
  944. assert!(!socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &icmp_repr.into()));
  945. }
  946. #[test]
  947. fn test_accepts_udp() {
  948. let mut socket = socket(buffer(1), buffer(1));
  949. let mut cx = Context::mock();
  950. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V6.into())), Ok(()));
  951. let checksum = ChecksumCapabilities::default();
  952. let mut bytes = [0xff; 18];
  953. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  954. UDP_REPR.emit(
  955. &mut packet,
  956. &REMOTE_IPV6.into(),
  957. &LOCAL_IPV6.into(),
  958. UDP_PAYLOAD.len(),
  959. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  960. &checksum,
  961. );
  962. let data = &*packet.into_inner();
  963. let icmp_repr = Icmpv6Repr::DstUnreachable {
  964. reason: Icmpv6DstUnreachable::PortUnreachable,
  965. header: Ipv6Repr {
  966. src_addr: LOCAL_IPV6,
  967. dst_addr: REMOTE_IPV6,
  968. next_header: IpProtocol::Icmpv6,
  969. payload_len: 12,
  970. hop_limit: 0x40,
  971. },
  972. data: data,
  973. };
  974. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  975. src_addr: REMOTE_IPV6,
  976. dst_addr: LOCAL_IPV6,
  977. next_header: IpProtocol::Icmpv6,
  978. payload_len: icmp_repr.buffer_len(),
  979. hop_limit: 0x40,
  980. });
  981. assert!(!socket.can_recv());
  982. // Ensure we can accept ICMP error response to the bound
  983. // UDP port
  984. assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
  985. socket.process(&mut cx, &ip_repr, &icmp_repr.into());
  986. assert!(socket.can_recv());
  987. let mut bytes = [0x00; 66];
  988. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
  989. icmp_repr.emit(
  990. &LOCAL_IPV6.into(),
  991. &REMOTE_IPV6.into(),
  992. &mut packet,
  993. &checksum,
  994. );
  995. assert_eq!(
  996. socket.recv(),
  997. Ok((&*packet.into_inner(), REMOTE_IPV6.into()))
  998. );
  999. assert!(!socket.can_recv());
  1000. }
  1001. }