interface.rs 145 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921
  1. // Heads up! Before working on this file you should read the parts
  2. // of RFC 1122 that discuss Ethernet, ARP and IP for any IPv4 work
  3. // and RFCs 8200 and 4861 for any IPv6 and NDISC work.
  4. use core::cmp;
  5. use managed::{ManagedMap, ManagedSlice};
  6. use crate::iface::Routes;
  7. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  8. use crate::iface::{NeighborAnswer, NeighborCache};
  9. use crate::phy::{Device, DeviceCapabilities, Medium, RxToken, TxToken};
  10. use crate::socket::*;
  11. use crate::time::{Duration, Instant};
  12. use crate::wire::*;
  13. use crate::{Error, Result};
  14. /// A network interface.
  15. ///
  16. /// The network interface logically owns a number of other data structures; to avoid
  17. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  18. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  19. pub struct Interface<'a, DeviceT: for<'d> Device<'d>> {
  20. device: DeviceT,
  21. sockets: SocketSet<'a>,
  22. inner: InterfaceInner<'a>,
  23. }
  24. /// The device independent part of an Ethernet network interface.
  25. ///
  26. /// Separating the device from the data required for prorcessing and dispatching makes
  27. /// it possible to borrow them independently. For example, the tx and rx tokens borrow
  28. /// the `device` mutably until they're used, which makes it impossible to call other
  29. /// methods on the `Interface` in this time (since its `device` field is borrowed
  30. /// exclusively). However, it is still possible to call methods on its `inner` field.
  31. struct InterfaceInner<'a> {
  32. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  33. neighbor_cache: Option<NeighborCache<'a>>,
  34. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  35. hardware_addr: Option<HardwareAddress>,
  36. #[cfg(feature = "medium-ieee802154")]
  37. sequence_no: u8,
  38. #[cfg(feature = "medium-ieee802154")]
  39. pan_id: Option<Ieee802154Pan>,
  40. ip_addrs: ManagedSlice<'a, IpCidr>,
  41. #[cfg(feature = "proto-ipv4")]
  42. any_ip: bool,
  43. routes: Routes<'a>,
  44. #[cfg(feature = "proto-igmp")]
  45. ipv4_multicast_groups: ManagedMap<'a, Ipv4Address, ()>,
  46. /// When to report for (all or) the next multicast group membership via IGMP
  47. #[cfg(feature = "proto-igmp")]
  48. igmp_report_state: IgmpReportState,
  49. }
  50. /// A builder structure used for creating a network interface.
  51. pub struct InterfaceBuilder<'a, DeviceT: for<'d> Device<'d>> {
  52. device: DeviceT,
  53. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  54. hardware_addr: Option<HardwareAddress>,
  55. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  56. neighbor_cache: Option<NeighborCache<'a>>,
  57. #[cfg(feature = "medium-ieee802154")]
  58. sequence_no: u8,
  59. #[cfg(feature = "medium-ieee802154")]
  60. pan_id: Option<Ieee802154Pan>,
  61. ip_addrs: ManagedSlice<'a, IpCidr>,
  62. sockets: SocketSet<'a>,
  63. #[cfg(feature = "proto-ipv4")]
  64. any_ip: bool,
  65. routes: Routes<'a>,
  66. /// Does not share storage with `ipv6_multicast_groups` to avoid IPv6 size overhead.
  67. #[cfg(feature = "proto-igmp")]
  68. ipv4_multicast_groups: ManagedMap<'a, Ipv4Address, ()>,
  69. }
  70. impl<'a, DeviceT> InterfaceBuilder<'a, DeviceT>
  71. where
  72. DeviceT: for<'d> Device<'d>,
  73. {
  74. /// Create a builder used for creating a network interface using the
  75. /// given device and address.
  76. #[cfg_attr(
  77. feature = "medium-ethernet",
  78. doc = r##"
  79. # Examples
  80. ```
  81. # use std::collections::BTreeMap;
  82. use smoltcp::iface::{InterfaceBuilder, NeighborCache};
  83. # use smoltcp::phy::{Loopback, Medium};
  84. use smoltcp::wire::{EthernetAddress, IpCidr, IpAddress};
  85. let device = // ...
  86. # Loopback::new(Medium::Ethernet);
  87. let hw_addr = // ...
  88. # EthernetAddress::default();
  89. let neighbor_cache = // ...
  90. # NeighborCache::new(BTreeMap::new());
  91. let ip_addrs = // ...
  92. # [];
  93. let iface = InterfaceBuilder::new(device, vec![])
  94. .hardware_addr(hw_addr.into())
  95. .neighbor_cache(neighbor_cache)
  96. .ip_addrs(ip_addrs)
  97. .finalize();
  98. ```
  99. "##
  100. )]
  101. pub fn new<SocketsT>(device: DeviceT, sockets: SocketsT) -> Self
  102. where
  103. SocketsT: Into<ManagedSlice<'a, Option<SocketSetItem<'a>>>>,
  104. {
  105. InterfaceBuilder {
  106. device: device,
  107. sockets: SocketSet::new(sockets),
  108. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  109. hardware_addr: None,
  110. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  111. neighbor_cache: None,
  112. #[cfg(feature = "medium-ieee802154")]
  113. sequence_no: 1,
  114. #[cfg(feature = "medium-ieee802154")]
  115. pan_id: None,
  116. ip_addrs: ManagedSlice::Borrowed(&mut []),
  117. #[cfg(feature = "proto-ipv4")]
  118. any_ip: false,
  119. routes: Routes::new(ManagedMap::Borrowed(&mut [])),
  120. #[cfg(feature = "proto-igmp")]
  121. ipv4_multicast_groups: ManagedMap::Borrowed(&mut []),
  122. }
  123. }
  124. /// Set the Hardware address the interface will use. See also
  125. /// [ethernet_addr].
  126. ///
  127. /// # Panics
  128. /// This function panics if the address is not unicast.
  129. ///
  130. /// [ethernet_addr]: struct.Interface.html#method.ethernet_addr
  131. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  132. pub fn hardware_addr(mut self, addr: HardwareAddress) -> Self {
  133. InterfaceInner::check_hardware_addr(&addr);
  134. self.hardware_addr = Some(addr);
  135. self
  136. }
  137. /// Set the initial IEEE802.15.4 sequence number the interface will use.
  138. ///
  139. /// **NOTE**: this needs to be initailized randomly and not equal to 0.
  140. #[cfg(feature = "medium-ieee802154")]
  141. pub fn sequence_no(mut self, sequence_no: u8) -> Self {
  142. self.sequence_no = sequence_no;
  143. self
  144. }
  145. /// Set the IEEE802.15.4 PAN ID the interface will use.
  146. ///
  147. /// **NOTE**: we use the same PAN ID for destination and source.
  148. #[cfg(feature = "medium-ieee802154")]
  149. pub fn pan_id(mut self, pan_id: Ieee802154Pan) -> Self {
  150. self.pan_id = Some(pan_id);
  151. self
  152. }
  153. /// Set the IP addresses the interface will use. See also
  154. /// [ip_addrs].
  155. ///
  156. /// # Panics
  157. /// This function panics if any of the addresses are not unicast.
  158. ///
  159. /// [ip_addrs]: struct.Interface.html#method.ip_addrs
  160. pub fn ip_addrs<T>(mut self, ip_addrs: T) -> Self
  161. where
  162. T: Into<ManagedSlice<'a, IpCidr>>,
  163. {
  164. let ip_addrs = ip_addrs.into();
  165. InterfaceInner::check_ip_addrs(&ip_addrs);
  166. self.ip_addrs = ip_addrs;
  167. self
  168. }
  169. /// Enable or disable the AnyIP capability, allowing packets to be received
  170. /// locally on IPv4 addresses other than the interface's configured [ip_addrs].
  171. /// When AnyIP is enabled and a route prefix in [routes] specifies one of
  172. /// the interface's [ip_addrs] as its gateway, the interface will accept
  173. /// packets addressed to that prefix.
  174. ///
  175. /// # IPv6
  176. ///
  177. /// This option is not available or required for IPv6 as packets sent to
  178. /// the interface are not filtered by IPv6 address.
  179. ///
  180. /// [routes]: struct.Interface.html#method.routes
  181. /// [ip_addrs]: struct.Interface.html#method.ip_addrs
  182. #[cfg(feature = "proto-ipv4")]
  183. pub fn any_ip(mut self, enabled: bool) -> Self {
  184. self.any_ip = enabled;
  185. self
  186. }
  187. /// Set the IP routes the interface will use. See also
  188. /// [routes].
  189. ///
  190. /// [routes]: struct.Interface.html#method.routes
  191. pub fn routes<T>(mut self, routes: T) -> InterfaceBuilder<'a, DeviceT>
  192. where
  193. T: Into<Routes<'a>>,
  194. {
  195. self.routes = routes.into();
  196. self
  197. }
  198. /// Provide storage for multicast groups.
  199. ///
  200. /// Join multicast groups by calling [`join_multicast_group()`] on an `Interface`.
  201. /// Using [`join_multicast_group()`] will send initial membership reports.
  202. ///
  203. /// A previously destroyed interface can be recreated by reusing the multicast group
  204. /// storage, i.e. providing a non-empty storage to `ipv4_multicast_groups()`.
  205. /// Note that this way initial membership reports are **not** sent.
  206. ///
  207. /// [`join_multicast_group()`]: struct.Interface.html#method.join_multicast_group
  208. #[cfg(feature = "proto-igmp")]
  209. pub fn ipv4_multicast_groups<T>(mut self, ipv4_multicast_groups: T) -> Self
  210. where
  211. T: Into<ManagedMap<'a, Ipv4Address, ()>>,
  212. {
  213. self.ipv4_multicast_groups = ipv4_multicast_groups.into();
  214. self
  215. }
  216. /// Set the Neighbor Cache the interface will use.
  217. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  218. pub fn neighbor_cache(mut self, neighbor_cache: NeighborCache<'a>) -> Self {
  219. self.neighbor_cache = Some(neighbor_cache);
  220. self
  221. }
  222. /// Create a network interface using the previously provided configuration.
  223. ///
  224. /// # Panics
  225. /// If a required option is not provided, this function will panic. Required
  226. /// options are:
  227. ///
  228. /// - [ethernet_addr]
  229. /// - [neighbor_cache]
  230. ///
  231. /// [ethernet_addr]: #method.ethernet_addr
  232. /// [neighbor_cache]: #method.neighbor_cache
  233. pub fn finalize(self) -> Interface<'a, DeviceT> {
  234. let device_capabilities = self.device.capabilities();
  235. let (hardware_addr, neighbor_cache) = match device_capabilities.medium {
  236. #[cfg(feature = "medium-ethernet")]
  237. Medium::Ethernet => (
  238. Some(
  239. self.hardware_addr
  240. .expect("hardware_addr required option was not set"),
  241. ),
  242. Some(
  243. self.neighbor_cache
  244. .expect("neighbor_cache required option was not set"),
  245. ),
  246. ),
  247. #[cfg(feature = "medium-ip")]
  248. Medium::Ip => {
  249. assert!(
  250. self.hardware_addr.is_none(),
  251. "hardware_addr is set, but device medium is IP"
  252. );
  253. assert!(
  254. self.neighbor_cache.is_none(),
  255. "neighbor_cache is set, but device medium is IP"
  256. );
  257. (None, None)
  258. }
  259. #[cfg(feature = "medium-ieee802154")]
  260. Medium::Ieee802154 => (
  261. Some(
  262. self.hardware_addr
  263. .expect("hardware_addr required option was not set"),
  264. ),
  265. Some(
  266. self.neighbor_cache
  267. .expect("neighbor_cache required option was not set"),
  268. ),
  269. ),
  270. };
  271. Interface {
  272. device: self.device,
  273. sockets: self.sockets,
  274. inner: InterfaceInner {
  275. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  276. hardware_addr,
  277. ip_addrs: self.ip_addrs,
  278. #[cfg(feature = "proto-ipv4")]
  279. any_ip: self.any_ip,
  280. routes: self.routes,
  281. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  282. neighbor_cache,
  283. #[cfg(feature = "proto-igmp")]
  284. ipv4_multicast_groups: self.ipv4_multicast_groups,
  285. #[cfg(feature = "proto-igmp")]
  286. igmp_report_state: IgmpReportState::Inactive,
  287. #[cfg(feature = "medium-ieee802154")]
  288. sequence_no: self.sequence_no,
  289. #[cfg(feature = "medium-ieee802154")]
  290. pan_id: self.pan_id,
  291. },
  292. }
  293. }
  294. }
  295. #[derive(Debug, PartialEq)]
  296. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  297. #[cfg(feature = "medium-ethernet")]
  298. enum EthernetPacket<'a> {
  299. #[cfg(feature = "proto-ipv4")]
  300. Arp(ArpRepr),
  301. Ip(IpPacket<'a>),
  302. }
  303. #[derive(Debug, PartialEq)]
  304. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  305. pub(crate) enum IpPacket<'a> {
  306. #[cfg(feature = "proto-ipv4")]
  307. Icmpv4((Ipv4Repr, Icmpv4Repr<'a>)),
  308. #[cfg(feature = "proto-igmp")]
  309. Igmp((Ipv4Repr, IgmpRepr)),
  310. #[cfg(feature = "proto-ipv6")]
  311. Icmpv6((Ipv6Repr, Icmpv6Repr<'a>)),
  312. #[cfg(feature = "socket-raw")]
  313. Raw((IpRepr, &'a [u8])),
  314. #[cfg(feature = "socket-udp")]
  315. Udp((IpRepr, UdpRepr, &'a [u8])),
  316. #[cfg(feature = "socket-tcp")]
  317. Tcp((IpRepr, TcpRepr<'a>)),
  318. #[cfg(feature = "socket-dhcpv4")]
  319. Dhcpv4((Ipv4Repr, UdpRepr, DhcpRepr<'a>)),
  320. }
  321. impl<'a> IpPacket<'a> {
  322. pub(crate) fn ip_repr(&self) -> IpRepr {
  323. match self {
  324. #[cfg(feature = "proto-ipv4")]
  325. IpPacket::Icmpv4((ipv4_repr, _)) => IpRepr::Ipv4(*ipv4_repr),
  326. #[cfg(feature = "proto-igmp")]
  327. IpPacket::Igmp((ipv4_repr, _)) => IpRepr::Ipv4(*ipv4_repr),
  328. #[cfg(feature = "proto-ipv6")]
  329. IpPacket::Icmpv6((ipv6_repr, _)) => IpRepr::Ipv6(*ipv6_repr),
  330. #[cfg(feature = "socket-raw")]
  331. IpPacket::Raw((ip_repr, _)) => ip_repr.clone(),
  332. #[cfg(feature = "socket-udp")]
  333. IpPacket::Udp((ip_repr, _, _)) => ip_repr.clone(),
  334. #[cfg(feature = "socket-tcp")]
  335. IpPacket::Tcp((ip_repr, _)) => ip_repr.clone(),
  336. #[cfg(feature = "socket-dhcpv4")]
  337. IpPacket::Dhcpv4((ipv4_repr, _, _)) => IpRepr::Ipv4(*ipv4_repr),
  338. }
  339. }
  340. pub(crate) fn emit_payload(
  341. &self,
  342. _ip_repr: IpRepr,
  343. payload: &mut [u8],
  344. caps: &DeviceCapabilities,
  345. ) {
  346. match self {
  347. #[cfg(feature = "proto-ipv4")]
  348. IpPacket::Icmpv4((_, icmpv4_repr)) => {
  349. icmpv4_repr.emit(&mut Icmpv4Packet::new_unchecked(payload), &caps.checksum)
  350. }
  351. #[cfg(feature = "proto-igmp")]
  352. IpPacket::Igmp((_, igmp_repr)) => {
  353. igmp_repr.emit(&mut IgmpPacket::new_unchecked(payload))
  354. }
  355. #[cfg(feature = "proto-ipv6")]
  356. IpPacket::Icmpv6((_, icmpv6_repr)) => icmpv6_repr.emit(
  357. &_ip_repr.src_addr(),
  358. &_ip_repr.dst_addr(),
  359. &mut Icmpv6Packet::new_unchecked(payload),
  360. &caps.checksum,
  361. ),
  362. #[cfg(feature = "socket-raw")]
  363. IpPacket::Raw((_, raw_packet)) => payload.copy_from_slice(raw_packet),
  364. #[cfg(feature = "socket-udp")]
  365. IpPacket::Udp((_, udp_repr, inner_payload)) => udp_repr.emit(
  366. &mut UdpPacket::new_unchecked(payload),
  367. &_ip_repr.src_addr(),
  368. &_ip_repr.dst_addr(),
  369. inner_payload.len(),
  370. |buf| buf.copy_from_slice(inner_payload),
  371. &caps.checksum,
  372. ),
  373. #[cfg(feature = "socket-tcp")]
  374. IpPacket::Tcp((_, mut tcp_repr)) => {
  375. // This is a terrible hack to make TCP performance more acceptable on systems
  376. // where the TCP buffers are significantly larger than network buffers,
  377. // e.g. a 64 kB TCP receive buffer (and so, when empty, a 64k window)
  378. // together with four 1500 B Ethernet receive buffers. If left untreated,
  379. // this would result in our peer pushing our window and sever packet loss.
  380. //
  381. // I'm really not happy about this "solution" but I don't know what else to do.
  382. if let Some(max_burst_size) = caps.max_burst_size {
  383. let mut max_segment_size = caps.max_transmission_unit;
  384. max_segment_size -= _ip_repr.buffer_len();
  385. max_segment_size -= tcp_repr.header_len();
  386. let max_window_size = max_burst_size * max_segment_size;
  387. if tcp_repr.window_len as usize > max_window_size {
  388. tcp_repr.window_len = max_window_size as u16;
  389. }
  390. }
  391. tcp_repr.emit(
  392. &mut TcpPacket::new_unchecked(payload),
  393. &_ip_repr.src_addr(),
  394. &_ip_repr.dst_addr(),
  395. &caps.checksum,
  396. );
  397. }
  398. #[cfg(feature = "socket-dhcpv4")]
  399. IpPacket::Dhcpv4((_, udp_repr, dhcp_repr)) => udp_repr.emit(
  400. &mut UdpPacket::new_unchecked(payload),
  401. &_ip_repr.src_addr(),
  402. &_ip_repr.dst_addr(),
  403. dhcp_repr.buffer_len(),
  404. |buf| dhcp_repr.emit(&mut DhcpPacket::new_unchecked(buf)).unwrap(),
  405. &caps.checksum,
  406. ),
  407. }
  408. }
  409. }
  410. #[cfg(any(feature = "proto-ipv4", feature = "proto-ipv6"))]
  411. fn icmp_reply_payload_len(len: usize, mtu: usize, header_len: usize) -> usize {
  412. // Send back as much of the original payload as will fit within
  413. // the minimum MTU required by IPv4. See RFC 1812 § 4.3.2.3 for
  414. // more details.
  415. //
  416. // Since the entire network layer packet must fit within the minumum
  417. // MTU supported, the payload must not exceed the following:
  418. //
  419. // <min mtu> - IP Header Size * 2 - ICMPv4 DstUnreachable hdr size
  420. cmp::min(len, mtu - header_len * 2 - 8)
  421. }
  422. #[cfg(feature = "proto-igmp")]
  423. enum IgmpReportState {
  424. Inactive,
  425. ToGeneralQuery {
  426. version: IgmpVersion,
  427. timeout: Instant,
  428. interval: Duration,
  429. next_index: usize,
  430. },
  431. ToSpecificQuery {
  432. version: IgmpVersion,
  433. timeout: Instant,
  434. group: Ipv4Address,
  435. },
  436. }
  437. impl<'a, DeviceT> Interface<'a, DeviceT>
  438. where
  439. DeviceT: for<'d> Device<'d>,
  440. {
  441. /// Add a socket to the interface, and return its handle.
  442. ///
  443. /// # Panics
  444. /// This function panics if the storage is fixed-size (not a `Vec`) and is full.
  445. pub fn add_socket<T>(&mut self, socket: T) -> SocketHandle
  446. where
  447. T: Into<Socket<'a>>,
  448. {
  449. self.sockets.add(socket)
  450. }
  451. /// Get a socket from the interface by its handle, as mutable.
  452. ///
  453. /// # Panics
  454. /// This function may panic if the handle does not belong to this socket set
  455. /// or the socket has the wrong type.
  456. pub fn get_socket<T: AnySocket<'a>>(&mut self, handle: SocketHandle) -> &mut T {
  457. self.sockets.get(handle)
  458. }
  459. /// Remove a socket from the set, without changing its state.
  460. ///
  461. /// # Panics
  462. /// This function may panic if the handle does not belong to this socket set.
  463. pub fn remove_socket(&mut self, handle: SocketHandle) -> Socket<'a> {
  464. self.sockets.remove(handle)
  465. }
  466. /// Get the HardwareAddress address of the interface.
  467. ///
  468. /// # Panics
  469. /// This function panics if the medium is not Ethernet or Ieee802154.
  470. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  471. pub fn hardware_addr(&self) -> HardwareAddress {
  472. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  473. assert!(self.device().capabilities().medium == Medium::Ethernet);
  474. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  475. assert!(self.device().capabilities().medium == Medium::Ieee802154);
  476. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  477. assert!(
  478. self.device().capabilities().medium == Medium::Ethernet
  479. || self.device().capabilities().medium == Medium::Ethernet
  480. );
  481. self.inner.hardware_addr.unwrap()
  482. }
  483. /// Set the HardwareAddress address of the interface.
  484. ///
  485. /// # Panics
  486. /// This function panics if the address is not unicast, and if the medium is not Ethernet or
  487. /// Ieee802154.
  488. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  489. pub fn set_hardware_addr(&mut self, addr: HardwareAddress) {
  490. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  491. assert!(self.device().capabilities().medium == Medium::Ethernet);
  492. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  493. assert!(self.device().capabilities().medium == Medium::Ieee802154);
  494. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  495. assert!(
  496. self.device().capabilities().medium == Medium::Ethernet
  497. || self.device().capabilities().medium == Medium::Ethernet
  498. );
  499. InterfaceInner::check_hardware_addr(&addr);
  500. self.inner.hardware_addr = Some(addr);
  501. }
  502. /// Get a reference to the inner device.
  503. pub fn device(&self) -> &DeviceT {
  504. &self.device
  505. }
  506. /// Get a mutable reference to the inner device.
  507. ///
  508. /// There are no invariants imposed on the device by the interface itself. Furthermore the
  509. /// trait implementations, required for references of all lifetimes, guarantees that the
  510. /// mutable reference can not invalidate the device as such. For some devices, such access may
  511. /// still allow modifications with adverse effects on the usability as a `phy` device. You
  512. /// should not use them this way.
  513. pub fn device_mut(&mut self) -> &mut DeviceT {
  514. &mut self.device
  515. }
  516. /// Add an address to a list of subscribed multicast IP addresses.
  517. ///
  518. /// Returns `Ok(announce_sent)` if the address was added successfully, where `annouce_sent`
  519. /// indicates whether an initial immediate announcement has been sent.
  520. pub fn join_multicast_group<T: Into<IpAddress>>(
  521. &mut self,
  522. addr: T,
  523. _timestamp: Instant,
  524. ) -> Result<bool> {
  525. match addr.into() {
  526. #[cfg(feature = "proto-igmp")]
  527. IpAddress::Ipv4(addr) => {
  528. let is_not_new = self
  529. .inner
  530. .ipv4_multicast_groups
  531. .insert(addr, ())
  532. .map_err(|_| Error::Exhausted)?
  533. .is_some();
  534. if is_not_new {
  535. Ok(false)
  536. } else if let Some(pkt) = self.inner.igmp_report_packet(IgmpVersion::Version2, addr)
  537. {
  538. let cx = self.context(_timestamp);
  539. // Send initial membership report
  540. let tx_token = self.device.transmit().ok_or(Error::Exhausted)?;
  541. self.inner.dispatch_ip(&cx, tx_token, pkt)?;
  542. Ok(true)
  543. } else {
  544. Ok(false)
  545. }
  546. }
  547. // Multicast is not yet implemented for other address families
  548. _ => Err(Error::Unaddressable),
  549. }
  550. }
  551. /// Remove an address from the subscribed multicast IP addresses.
  552. ///
  553. /// Returns `Ok(leave_sent)` if the address was removed successfully, where `leave_sent`
  554. /// indicates whether an immediate leave packet has been sent.
  555. pub fn leave_multicast_group<T: Into<IpAddress>>(
  556. &mut self,
  557. addr: T,
  558. _timestamp: Instant,
  559. ) -> Result<bool> {
  560. match addr.into() {
  561. #[cfg(feature = "proto-igmp")]
  562. IpAddress::Ipv4(addr) => {
  563. let was_not_present = self.inner.ipv4_multicast_groups.remove(&addr).is_none();
  564. if was_not_present {
  565. Ok(false)
  566. } else if let Some(pkt) = self.inner.igmp_leave_packet(addr) {
  567. let cx = self.context(_timestamp);
  568. // Send group leave packet
  569. let tx_token = self.device.transmit().ok_or(Error::Exhausted)?;
  570. self.inner.dispatch_ip(&cx, tx_token, pkt)?;
  571. Ok(true)
  572. } else {
  573. Ok(false)
  574. }
  575. }
  576. // Multicast is not yet implemented for other address families
  577. _ => Err(Error::Unaddressable),
  578. }
  579. }
  580. /// Check whether the interface listens to given destination multicast IP address.
  581. pub fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  582. self.inner.has_multicast_group(addr)
  583. }
  584. /// Get the IP addresses of the interface.
  585. pub fn ip_addrs(&self) -> &[IpCidr] {
  586. self.inner.ip_addrs.as_ref()
  587. }
  588. /// Get the first IPv4 address if present.
  589. #[cfg(feature = "proto-ipv4")]
  590. pub fn ipv4_addr(&self) -> Option<Ipv4Address> {
  591. self.ip_addrs()
  592. .iter()
  593. .filter_map(|cidr| match cidr.address() {
  594. IpAddress::Ipv4(addr) => Some(addr),
  595. _ => None,
  596. })
  597. .next()
  598. }
  599. /// Update the IP addresses of the interface.
  600. ///
  601. /// # Panics
  602. /// This function panics if any of the addresses are not unicast.
  603. pub fn update_ip_addrs<F: FnOnce(&mut ManagedSlice<'a, IpCidr>)>(&mut self, f: F) {
  604. f(&mut self.inner.ip_addrs);
  605. InterfaceInner::flush_cache(&mut self.inner);
  606. InterfaceInner::check_ip_addrs(&self.inner.ip_addrs)
  607. }
  608. /// Check whether the interface has the given IP address assigned.
  609. pub fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  610. self.inner.has_ip_addr(addr)
  611. }
  612. /// Get the first IPv4 address of the interface.
  613. #[cfg(feature = "proto-ipv4")]
  614. pub fn ipv4_address(&self) -> Option<Ipv4Address> {
  615. self.inner.ipv4_address()
  616. }
  617. pub fn routes(&self) -> &Routes<'a> {
  618. &self.inner.routes
  619. }
  620. pub fn routes_mut(&mut self) -> &mut Routes<'a> {
  621. &mut self.inner.routes
  622. }
  623. /// Transmit packets queued in the given sockets, and receive packets queued
  624. /// in the device.
  625. ///
  626. /// This function returns a boolean value indicating whether any packets were
  627. /// processed or emitted, and thus, whether the readiness of any socket might
  628. /// have changed.
  629. ///
  630. /// # Errors
  631. /// This method will routinely return errors in response to normal network
  632. /// activity as well as certain boundary conditions such as buffer exhaustion.
  633. /// These errors are provided as an aid for troubleshooting, and are meant
  634. /// to be logged and ignored.
  635. ///
  636. /// As a special case, `Err(Error::Unrecognized)` is returned in response to
  637. /// packets containing any unsupported protocol, option, or form, which is
  638. /// a very common occurrence and on a production system it should not even
  639. /// be logged.
  640. pub fn poll(&mut self, timestamp: Instant) -> Result<bool> {
  641. let cx = self.context(timestamp);
  642. let mut readiness_may_have_changed = false;
  643. loop {
  644. let processed_any = self.socket_ingress(&cx);
  645. let emitted_any = self.socket_egress(&cx)?;
  646. #[cfg(feature = "proto-igmp")]
  647. self.igmp_egress(&cx, timestamp)?;
  648. if processed_any || emitted_any {
  649. readiness_may_have_changed = true;
  650. } else {
  651. break;
  652. }
  653. }
  654. Ok(readiness_may_have_changed)
  655. }
  656. /// Return a _soft deadline_ for calling [poll] the next time.
  657. /// The [Instant] returned is the time at which you should call [poll] next.
  658. /// It is harmless (but wastes energy) to call it before the [Instant], and
  659. /// potentially harmful (impacting quality of service) to call it after the
  660. /// [Instant]
  661. ///
  662. /// [poll]: #method.poll
  663. /// [Instant]: struct.Instant.html
  664. pub fn poll_at(&self, timestamp: Instant) -> Option<Instant> {
  665. let cx = self.context(timestamp);
  666. self.sockets
  667. .iter()
  668. .filter_map(|socket| {
  669. let socket_poll_at = socket.poll_at(&cx);
  670. match socket.meta().poll_at(socket_poll_at, |ip_addr| {
  671. self.inner.has_neighbor(&cx, &ip_addr)
  672. }) {
  673. PollAt::Ingress => None,
  674. PollAt::Time(instant) => Some(instant),
  675. PollAt::Now => Some(Instant::from_millis(0)),
  676. }
  677. })
  678. .min()
  679. }
  680. /// Return an _advisory wait time_ for calling [poll] the next time.
  681. /// The [Duration] returned is the time left to wait before calling [poll] next.
  682. /// It is harmless (but wastes energy) to call it before the [Duration] has passed,
  683. /// and potentially harmful (impacting quality of service) to call it after the
  684. /// [Duration] has passed.
  685. ///
  686. /// [poll]: #method.poll
  687. /// [Duration]: struct.Duration.html
  688. pub fn poll_delay(&self, timestamp: Instant) -> Option<Duration> {
  689. match self.poll_at(timestamp) {
  690. Some(poll_at) if timestamp < poll_at => Some(poll_at - timestamp),
  691. Some(_) => Some(Duration::from_millis(0)),
  692. _ => None,
  693. }
  694. }
  695. fn socket_ingress(&mut self, cx: &Context) -> bool {
  696. let mut processed_any = false;
  697. let Self {
  698. device,
  699. inner,
  700. sockets,
  701. } = self;
  702. while let Some((rx_token, tx_token)) = device.receive() {
  703. if let Err(err) = rx_token.consume(cx.now, |frame| match cx.caps.medium {
  704. #[cfg(feature = "medium-ethernet")]
  705. Medium::Ethernet => match inner.process_ethernet(cx, sockets, &frame) {
  706. Ok(response) => {
  707. processed_any = true;
  708. if let Some(packet) = response {
  709. if let Err(err) = inner.dispatch(cx, tx_token, packet) {
  710. net_debug!("Failed to send response: {}", err);
  711. }
  712. }
  713. Ok(())
  714. }
  715. Err(err) => {
  716. net_debug!("cannot process ingress packet: {}", err);
  717. #[cfg(not(feature = "defmt"))]
  718. net_debug!(
  719. "packet dump follows:\n{}",
  720. PrettyPrinter::<EthernetFrame<&[u8]>>::new("", &frame)
  721. );
  722. Err(err)
  723. }
  724. },
  725. #[cfg(feature = "medium-ip")]
  726. Medium::Ip => match inner.process_ip(cx, sockets, &frame) {
  727. Ok(response) => {
  728. processed_any = true;
  729. if let Some(packet) = response {
  730. if let Err(err) = inner.dispatch_ip(cx, tx_token, packet) {
  731. net_debug!("Failed to send response: {}", err);
  732. }
  733. }
  734. Ok(())
  735. }
  736. Err(err) => {
  737. net_debug!("cannot process ingress packet: {}", err);
  738. Err(err)
  739. }
  740. },
  741. #[cfg(feature = "medium-ieee802154")]
  742. Medium::Ieee802154 => match inner.process_ieee802154(cx, sockets, &frame) {
  743. Ok(response) => {
  744. processed_any = true;
  745. if let Some(packet) = response {
  746. if let Err(err) = inner.dispatch_ieee802154(cx, tx_token, packet) {
  747. net_debug!("Failed to send response: {}", err);
  748. }
  749. }
  750. Ok(())
  751. }
  752. Err(err) => {
  753. net_debug!("cannot process ingress packet: {}", err);
  754. Err(err)
  755. }
  756. },
  757. }) {
  758. net_debug!("Failed to consume RX token: {}", err);
  759. }
  760. }
  761. processed_any
  762. }
  763. fn socket_egress(&mut self, cx: &Context) -> Result<bool> {
  764. let Self {
  765. device,
  766. inner,
  767. sockets,
  768. } = self;
  769. let _caps = device.capabilities();
  770. let mut emitted_any = false;
  771. for socket in sockets.iter_mut() {
  772. if !socket
  773. .meta_mut()
  774. .egress_permitted(cx.now, |ip_addr| inner.has_neighbor(cx, &ip_addr))
  775. {
  776. continue;
  777. }
  778. let mut neighbor_addr = None;
  779. let mut device_result = Ok(());
  780. macro_rules! respond {
  781. ($response:expr) => {{
  782. let response = $response;
  783. neighbor_addr = Some(response.ip_repr().dst_addr());
  784. let tx_token = device.transmit().ok_or(Error::Exhausted)?;
  785. device_result = inner.dispatch_ip(cx, tx_token, response);
  786. device_result
  787. }};
  788. }
  789. let socket_result = match *socket {
  790. #[cfg(feature = "socket-raw")]
  791. Socket::Raw(ref mut socket) => {
  792. socket.dispatch(cx, |response| respond!(IpPacket::Raw(response)))
  793. }
  794. #[cfg(all(
  795. feature = "socket-icmp",
  796. any(feature = "proto-ipv4", feature = "proto-ipv6")
  797. ))]
  798. Socket::Icmp(ref mut socket) => socket.dispatch(cx, |response| match response {
  799. #[cfg(feature = "proto-ipv4")]
  800. (IpRepr::Ipv4(ipv4_repr), IcmpRepr::Ipv4(icmpv4_repr)) => {
  801. respond!(IpPacket::Icmpv4((ipv4_repr, icmpv4_repr)))
  802. }
  803. #[cfg(feature = "proto-ipv6")]
  804. (IpRepr::Ipv6(ipv6_repr), IcmpRepr::Ipv6(icmpv6_repr)) => {
  805. respond!(IpPacket::Icmpv6((ipv6_repr, icmpv6_repr)))
  806. }
  807. _ => Err(Error::Unaddressable),
  808. }),
  809. #[cfg(feature = "socket-udp")]
  810. Socket::Udp(ref mut socket) => {
  811. socket.dispatch(cx, |response| respond!(IpPacket::Udp(response)))
  812. }
  813. #[cfg(feature = "socket-tcp")]
  814. Socket::Tcp(ref mut socket) => {
  815. socket.dispatch(cx, |response| respond!(IpPacket::Tcp(response)))
  816. }
  817. #[cfg(feature = "socket-dhcpv4")]
  818. Socket::Dhcpv4(ref mut socket) => {
  819. socket.dispatch(cx, |response| respond!(IpPacket::Dhcpv4(response)))
  820. }
  821. };
  822. match (device_result, socket_result) {
  823. (Err(Error::Exhausted), _) => break, // nowhere to transmit
  824. (Ok(()), Err(Error::Exhausted)) => (), // nothing to transmit
  825. (Err(Error::Unaddressable), _) => {
  826. // `NeighborCache` already takes care of rate limiting the neighbor discovery
  827. // requests from the socket. However, without an additional rate limiting
  828. // mechanism, we would spin on every socket that has yet to discover its
  829. // neighboor.
  830. socket
  831. .meta_mut()
  832. .neighbor_missing(cx.now, neighbor_addr.expect("non-IP response packet"));
  833. break;
  834. }
  835. (Err(err), _) | (_, Err(err)) => {
  836. net_debug!(
  837. "{}: cannot dispatch egress packet: {}",
  838. socket.meta().handle,
  839. err
  840. );
  841. return Err(err);
  842. }
  843. (Ok(()), Ok(())) => emitted_any = true,
  844. }
  845. }
  846. Ok(emitted_any)
  847. }
  848. /// Depending on `igmp_report_state` and the therein contained
  849. /// timeouts, send IGMP membership reports.
  850. #[cfg(feature = "proto-igmp")]
  851. fn igmp_egress(&mut self, cx: &Context, timestamp: Instant) -> Result<bool> {
  852. match self.inner.igmp_report_state {
  853. IgmpReportState::ToSpecificQuery {
  854. version,
  855. timeout,
  856. group,
  857. } if timestamp >= timeout => {
  858. if let Some(pkt) = self.inner.igmp_report_packet(version, group) {
  859. // Send initial membership report
  860. let tx_token = self.device.transmit().ok_or(Error::Exhausted)?;
  861. self.inner.dispatch_ip(cx, tx_token, pkt)?;
  862. }
  863. self.inner.igmp_report_state = IgmpReportState::Inactive;
  864. Ok(true)
  865. }
  866. IgmpReportState::ToGeneralQuery {
  867. version,
  868. timeout,
  869. interval,
  870. next_index,
  871. } if timestamp >= timeout => {
  872. let addr = self
  873. .inner
  874. .ipv4_multicast_groups
  875. .iter()
  876. .nth(next_index)
  877. .map(|(addr, ())| *addr);
  878. match addr {
  879. Some(addr) => {
  880. if let Some(pkt) = self.inner.igmp_report_packet(version, addr) {
  881. // Send initial membership report
  882. let tx_token = self.device.transmit().ok_or(Error::Exhausted)?;
  883. self.inner.dispatch_ip(cx, tx_token, pkt)?;
  884. }
  885. let next_timeout = (timeout + interval).max(timestamp);
  886. self.inner.igmp_report_state = IgmpReportState::ToGeneralQuery {
  887. version,
  888. timeout: next_timeout,
  889. interval,
  890. next_index: next_index + 1,
  891. };
  892. Ok(true)
  893. }
  894. None => {
  895. self.inner.igmp_report_state = IgmpReportState::Inactive;
  896. Ok(false)
  897. }
  898. }
  899. }
  900. _ => Ok(false),
  901. }
  902. }
  903. fn context(&self, now: Instant) -> Context {
  904. Context {
  905. now,
  906. caps: self.device.capabilities(),
  907. #[cfg(all(
  908. any(feature = "medium-ethernet", feature = "medium-ieee802154"),
  909. feature = "socket-dhcpv4"
  910. ))]
  911. hardware_addr: self.inner.hardware_addr,
  912. #[cfg(feature = "medium-ieee802154")]
  913. pan_id: self.inner.pan_id,
  914. }
  915. }
  916. }
  917. impl<'a> InterfaceInner<'a> {
  918. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  919. fn check_hardware_addr(addr: &HardwareAddress) {
  920. if !addr.is_unicast() {
  921. panic!("Ethernet address {} is not unicast", addr)
  922. }
  923. }
  924. fn check_ip_addrs(addrs: &[IpCidr]) {
  925. for cidr in addrs {
  926. if !cidr.address().is_unicast() && !cidr.address().is_unspecified() {
  927. panic!("IP address {} is not unicast", cidr.address())
  928. }
  929. }
  930. }
  931. #[cfg(feature = "medium-ieee802154")]
  932. fn get_sequence_number(&mut self) -> u8 {
  933. let no = self.sequence_no;
  934. self.sequence_no = self.sequence_no.wrapping_add(1);
  935. no
  936. }
  937. /// Determine if the given `Ipv6Address` is the solicited node
  938. /// multicast address for a IPv6 addresses assigned to the interface.
  939. /// See [RFC 4291 § 2.7.1] for more details.
  940. ///
  941. /// [RFC 4291 § 2.7.1]: https://tools.ietf.org/html/rfc4291#section-2.7.1
  942. #[cfg(feature = "proto-ipv6")]
  943. pub fn has_solicited_node(&self, addr: Ipv6Address) -> bool {
  944. self.ip_addrs.iter().any(|cidr| {
  945. match *cidr {
  946. IpCidr::Ipv6(cidr) if cidr.address() != Ipv6Address::LOOPBACK => {
  947. // Take the lower order 24 bits of the IPv6 address and
  948. // append those bits to FF02:0:0:0:0:1:FF00::/104.
  949. addr.as_bytes()[14..] == cidr.address().as_bytes()[14..]
  950. }
  951. _ => false,
  952. }
  953. })
  954. }
  955. /// Check whether the interface has the given IP address assigned.
  956. fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  957. let addr = addr.into();
  958. self.ip_addrs.iter().any(|probe| probe.address() == addr)
  959. }
  960. /// Get the first IPv4 address of the interface.
  961. #[cfg(feature = "proto-ipv4")]
  962. pub fn ipv4_address(&self) -> Option<Ipv4Address> {
  963. self.ip_addrs
  964. .iter()
  965. .filter_map(|addr| match *addr {
  966. IpCidr::Ipv4(cidr) => Some(cidr.address()),
  967. #[cfg(feature = "proto-ipv6")]
  968. IpCidr::Ipv6(_) => None,
  969. })
  970. .next()
  971. }
  972. /// Check whether the interface listens to given destination multicast IP address.
  973. ///
  974. /// If built without feature `proto-igmp` this function will
  975. /// always return `false`.
  976. pub fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  977. match addr.into() {
  978. #[cfg(feature = "proto-igmp")]
  979. IpAddress::Ipv4(key) => {
  980. key == Ipv4Address::MULTICAST_ALL_SYSTEMS
  981. || self.ipv4_multicast_groups.get(&key).is_some()
  982. }
  983. _ => false,
  984. }
  985. }
  986. #[cfg(feature = "medium-ethernet")]
  987. fn process_ethernet<'frame, T: AsRef<[u8]>>(
  988. &mut self,
  989. cx: &Context,
  990. sockets: &mut SocketSet,
  991. frame: &'frame T,
  992. ) -> Result<Option<EthernetPacket<'frame>>> {
  993. let eth_frame = EthernetFrame::new_checked(frame)?;
  994. // Ignore any packets not directed to our hardware address or any of the multicast groups.
  995. if !eth_frame.dst_addr().is_broadcast()
  996. && !eth_frame.dst_addr().is_multicast()
  997. && HardwareAddress::Ethernet(eth_frame.dst_addr()) != self.hardware_addr.unwrap()
  998. {
  999. return Ok(None);
  1000. }
  1001. match eth_frame.ethertype() {
  1002. #[cfg(feature = "proto-ipv4")]
  1003. EthernetProtocol::Arp => self.process_arp(cx.now, &eth_frame),
  1004. #[cfg(feature = "proto-ipv4")]
  1005. EthernetProtocol::Ipv4 => {
  1006. let ipv4_packet = Ipv4Packet::new_checked(eth_frame.payload())?;
  1007. self.process_ipv4(cx, sockets, &ipv4_packet)
  1008. .map(|o| o.map(EthernetPacket::Ip))
  1009. }
  1010. #[cfg(feature = "proto-ipv6")]
  1011. EthernetProtocol::Ipv6 => {
  1012. let ipv6_packet = Ipv6Packet::new_checked(eth_frame.payload())?;
  1013. self.process_ipv6(cx, sockets, &ipv6_packet)
  1014. .map(|o| o.map(EthernetPacket::Ip))
  1015. }
  1016. // Drop all other traffic.
  1017. _ => Err(Error::Unrecognized),
  1018. }
  1019. }
  1020. #[cfg(feature = "medium-ip")]
  1021. fn process_ip<'frame, T: AsRef<[u8]>>(
  1022. &mut self,
  1023. cx: &Context,
  1024. sockets: &mut SocketSet,
  1025. ip_payload: &'frame T,
  1026. ) -> Result<Option<IpPacket<'frame>>> {
  1027. match IpVersion::of_packet(ip_payload.as_ref()) {
  1028. #[cfg(feature = "proto-ipv4")]
  1029. Ok(IpVersion::Ipv4) => {
  1030. let ipv4_packet = Ipv4Packet::new_checked(ip_payload)?;
  1031. self.process_ipv4(cx, sockets, &ipv4_packet)
  1032. }
  1033. #[cfg(feature = "proto-ipv6")]
  1034. Ok(IpVersion::Ipv6) => {
  1035. let ipv6_packet = Ipv6Packet::new_checked(ip_payload)?;
  1036. self.process_ipv6(cx, sockets, &ipv6_packet)
  1037. }
  1038. // Drop all other traffic.
  1039. _ => Err(Error::Unrecognized),
  1040. }
  1041. }
  1042. #[cfg(feature = "medium-ieee802154")]
  1043. fn process_ieee802154<'frame, T: AsRef<[u8]> + ?Sized>(
  1044. &mut self,
  1045. cx: &Context,
  1046. sockets: &mut SocketSet,
  1047. sixlowpan_payload: &'frame T,
  1048. ) -> Result<Option<IpPacket<'frame>>> {
  1049. let ieee802154_frame = Ieee802154Frame::new_checked(sixlowpan_payload)?;
  1050. let ieee802154_repr = Ieee802154Repr::parse(&ieee802154_frame)?;
  1051. if ieee802154_repr.frame_type != Ieee802154FrameType::Data {
  1052. return Ok(None);
  1053. }
  1054. // Drop frames when the user has set a PAN id and the PAN id from frame is not equal to this
  1055. // When the user didn't set a PAN id (so it is None), then we accept all PAN id's.
  1056. // We always accept the broadcast PAN id.
  1057. if cx.pan_id.is_some()
  1058. && ieee802154_repr.dst_pan_id != cx.pan_id
  1059. && ieee802154_repr.dst_pan_id != Some(Ieee802154Pan::BROADCAST)
  1060. {
  1061. net_debug!(
  1062. "dropping {:?} because not our PAN id (or not broadcast)",
  1063. ieee802154_repr
  1064. );
  1065. return Ok(None);
  1066. }
  1067. match ieee802154_frame.payload() {
  1068. Some(payload) => self.process_sixlowpan(cx, sockets, &ieee802154_repr, payload),
  1069. None => Ok(None),
  1070. }
  1071. }
  1072. #[cfg(feature = "proto-sixlowpan")]
  1073. fn process_sixlowpan<'frame, T: AsRef<[u8]> + ?Sized>(
  1074. &mut self,
  1075. cx: &Context,
  1076. sockets: &mut SocketSet,
  1077. ieee802154_repr: &Ieee802154Repr,
  1078. payload: &'frame T,
  1079. ) -> Result<Option<IpPacket<'frame>>> {
  1080. // The first header needs to be an IPHC header.
  1081. let iphc_packet = SixlowpanIphcPacket::new_checked(payload)?;
  1082. let iphc_repr = SixlowpanIphcRepr::parse(
  1083. &iphc_packet,
  1084. ieee802154_repr.src_addr,
  1085. ieee802154_repr.dst_addr,
  1086. )?;
  1087. let payload = iphc_packet.payload();
  1088. let mut ipv6_repr = Ipv6Repr {
  1089. src_addr: iphc_repr.src_addr,
  1090. dst_addr: iphc_repr.dst_addr,
  1091. hop_limit: iphc_repr.hop_limit,
  1092. next_header: IpProtocol::Unknown(0),
  1093. payload_len: iphc_repr.buffer_len(),
  1094. };
  1095. // Currently we assume the next header is a UDP, so we ignore everything else.
  1096. match iphc_repr.next_header {
  1097. SixlowpanNextHeader::Compressed => {
  1098. match SixlowpanNhcPacket::dispatch(payload)? {
  1099. SixlowpanNhcPacket::ExtensionHeader(_) => {
  1100. net_debug!("Extension headers are currently not supported for 6LoWPAN");
  1101. Ok(None)
  1102. }
  1103. SixlowpanNhcPacket::UdpHeader(udp_packet) => {
  1104. ipv6_repr.next_header = IpProtocol::Udp;
  1105. // Handle the UDP
  1106. let udp_repr = SixlowpanUdpRepr::parse(
  1107. &udp_packet,
  1108. &iphc_repr.src_addr,
  1109. &iphc_repr.dst_addr,
  1110. udp_packet.checksum(),
  1111. )?;
  1112. // Look for UDP sockets that will accept the UDP packet.
  1113. // If it does not accept the packet, then send an ICMP message.
  1114. for udp_socket in sockets.iter_mut().filter_map(UdpSocket::downcast) {
  1115. if !udp_socket.accepts(&IpRepr::Ipv6(ipv6_repr), &udp_repr) {
  1116. continue;
  1117. }
  1118. match udp_socket.process(
  1119. cx,
  1120. &IpRepr::Ipv6(ipv6_repr),
  1121. &udp_repr,
  1122. udp_packet.payload(),
  1123. ) {
  1124. Ok(()) => return Ok(None),
  1125. Err(e) => return Err(e),
  1126. }
  1127. }
  1128. let payload_len = icmp_reply_payload_len(
  1129. payload.len(),
  1130. IPV6_MIN_MTU,
  1131. ipv6_repr.buffer_len(),
  1132. );
  1133. let icmpv6_reply_repr = Icmpv6Repr::DstUnreachable {
  1134. reason: Icmpv6DstUnreachable::PortUnreachable,
  1135. header: ipv6_repr,
  1136. data: &payload[0..payload_len],
  1137. };
  1138. Ok(self.icmpv6_reply(ipv6_repr, icmpv6_reply_repr))
  1139. }
  1140. }
  1141. }
  1142. SixlowpanNextHeader::Uncompressed(nxt_hdr) => match nxt_hdr {
  1143. IpProtocol::Icmpv6 => {
  1144. ipv6_repr.next_header = IpProtocol::Icmpv6;
  1145. self.process_icmpv6(cx, sockets, IpRepr::Ipv6(ipv6_repr), iphc_packet.payload())
  1146. }
  1147. _ => {
  1148. net_debug!("Headers other than ICMPv6 and compressed headers are currently not supported for 6LoWPAN");
  1149. Ok(None)
  1150. }
  1151. },
  1152. }
  1153. }
  1154. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  1155. fn process_arp<'frame, T: AsRef<[u8]>>(
  1156. &mut self,
  1157. timestamp: Instant,
  1158. eth_frame: &EthernetFrame<&'frame T>,
  1159. ) -> Result<Option<EthernetPacket<'frame>>> {
  1160. let arp_packet = ArpPacket::new_checked(eth_frame.payload())?;
  1161. let arp_repr = ArpRepr::parse(&arp_packet)?;
  1162. match arp_repr {
  1163. ArpRepr::EthernetIpv4 {
  1164. operation,
  1165. source_hardware_addr,
  1166. source_protocol_addr,
  1167. target_protocol_addr,
  1168. ..
  1169. } => {
  1170. // Only process ARP packets for us.
  1171. if !self.has_ip_addr(target_protocol_addr) {
  1172. return Ok(None);
  1173. }
  1174. // Only process REQUEST and RESPONSE.
  1175. if let ArpOperation::Unknown(_) = operation {
  1176. net_debug!("arp: unknown operation code");
  1177. return Err(Error::Malformed);
  1178. }
  1179. // Discard packets with non-unicast source addresses.
  1180. if !source_protocol_addr.is_unicast() || !source_hardware_addr.is_unicast() {
  1181. net_debug!("arp: non-unicast source address");
  1182. return Err(Error::Malformed);
  1183. }
  1184. if !self.in_same_network(&IpAddress::Ipv4(source_protocol_addr)) {
  1185. net_debug!("arp: source IP address not in same network as us");
  1186. return Err(Error::Malformed);
  1187. }
  1188. // Fill the ARP cache from any ARP packet aimed at us (both request or response).
  1189. // We fill from requests too because if someone is requesting our address they
  1190. // are probably going to talk to us, so we avoid having to request their address
  1191. // when we later reply to them.
  1192. self.neighbor_cache.as_mut().unwrap().fill(
  1193. source_protocol_addr.into(),
  1194. source_hardware_addr.into(),
  1195. timestamp,
  1196. );
  1197. if operation == ArpOperation::Request {
  1198. let src_hardware_addr = match self.hardware_addr {
  1199. Some(HardwareAddress::Ethernet(addr)) => addr,
  1200. _ => unreachable!(),
  1201. };
  1202. Ok(Some(EthernetPacket::Arp(ArpRepr::EthernetIpv4 {
  1203. operation: ArpOperation::Reply,
  1204. source_hardware_addr: src_hardware_addr,
  1205. source_protocol_addr: target_protocol_addr,
  1206. target_hardware_addr: source_hardware_addr,
  1207. target_protocol_addr: source_protocol_addr,
  1208. })))
  1209. } else {
  1210. Ok(None)
  1211. }
  1212. }
  1213. }
  1214. }
  1215. #[cfg(all(
  1216. any(feature = "proto-ipv4", feature = "proto-ipv6"),
  1217. feature = "socket-raw"
  1218. ))]
  1219. fn raw_socket_filter<'frame>(
  1220. &mut self,
  1221. cx: &Context,
  1222. sockets: &mut SocketSet,
  1223. ip_repr: &IpRepr,
  1224. ip_payload: &'frame [u8],
  1225. ) -> bool {
  1226. let mut handled_by_raw_socket = false;
  1227. // Pass every IP packet to all raw sockets we have registered.
  1228. for raw_socket in sockets.iter_mut().filter_map(RawSocket::downcast) {
  1229. if !raw_socket.accepts(ip_repr) {
  1230. continue;
  1231. }
  1232. match raw_socket.process(cx, ip_repr, ip_payload) {
  1233. // The packet is valid and handled by socket.
  1234. Ok(()) => handled_by_raw_socket = true,
  1235. // The socket buffer is full or the packet was truncated
  1236. Err(Error::Exhausted) | Err(Error::Truncated) => (),
  1237. // Raw sockets don't validate the packets in any way.
  1238. Err(_) => unreachable!(),
  1239. }
  1240. }
  1241. handled_by_raw_socket
  1242. }
  1243. #[cfg(feature = "proto-ipv6")]
  1244. fn process_ipv6<'frame, T: AsRef<[u8]> + ?Sized>(
  1245. &mut self,
  1246. cx: &Context,
  1247. sockets: &mut SocketSet,
  1248. ipv6_packet: &Ipv6Packet<&'frame T>,
  1249. ) -> Result<Option<IpPacket<'frame>>> {
  1250. let ipv6_repr = Ipv6Repr::parse(ipv6_packet)?;
  1251. if !ipv6_repr.src_addr.is_unicast() {
  1252. // Discard packets with non-unicast source addresses.
  1253. net_debug!("non-unicast source address");
  1254. return Err(Error::Malformed);
  1255. }
  1256. let ip_payload = ipv6_packet.payload();
  1257. #[cfg(feature = "socket-raw")]
  1258. let handled_by_raw_socket =
  1259. self.raw_socket_filter(cx, sockets, &ipv6_repr.into(), ip_payload);
  1260. #[cfg(not(feature = "socket-raw"))]
  1261. let handled_by_raw_socket = false;
  1262. self.process_nxt_hdr(
  1263. cx,
  1264. sockets,
  1265. ipv6_repr,
  1266. ipv6_repr.next_header,
  1267. handled_by_raw_socket,
  1268. ip_payload,
  1269. )
  1270. }
  1271. /// Given the next header value forward the payload onto the correct process
  1272. /// function.
  1273. #[cfg(feature = "proto-ipv6")]
  1274. fn process_nxt_hdr<'frame>(
  1275. &mut self,
  1276. cx: &Context,
  1277. sockets: &mut SocketSet,
  1278. ipv6_repr: Ipv6Repr,
  1279. nxt_hdr: IpProtocol,
  1280. handled_by_raw_socket: bool,
  1281. ip_payload: &'frame [u8],
  1282. ) -> Result<Option<IpPacket<'frame>>> {
  1283. match nxt_hdr {
  1284. IpProtocol::Icmpv6 => self.process_icmpv6(cx, sockets, ipv6_repr.into(), ip_payload),
  1285. #[cfg(feature = "socket-udp")]
  1286. IpProtocol::Udp => self.process_udp(
  1287. cx,
  1288. sockets,
  1289. ipv6_repr.into(),
  1290. handled_by_raw_socket,
  1291. ip_payload,
  1292. ),
  1293. #[cfg(feature = "socket-tcp")]
  1294. IpProtocol::Tcp => self.process_tcp(cx, sockets, ipv6_repr.into(), ip_payload),
  1295. IpProtocol::HopByHop => {
  1296. self.process_hopbyhop(cx, sockets, ipv6_repr, handled_by_raw_socket, ip_payload)
  1297. }
  1298. #[cfg(feature = "socket-raw")]
  1299. _ if handled_by_raw_socket => Ok(None),
  1300. _ => {
  1301. // Send back as much of the original payload as we can.
  1302. let payload_len =
  1303. icmp_reply_payload_len(ip_payload.len(), IPV6_MIN_MTU, ipv6_repr.buffer_len());
  1304. let icmp_reply_repr = Icmpv6Repr::ParamProblem {
  1305. reason: Icmpv6ParamProblem::UnrecognizedNxtHdr,
  1306. // The offending packet is after the IPv6 header.
  1307. pointer: ipv6_repr.buffer_len() as u32,
  1308. header: ipv6_repr,
  1309. data: &ip_payload[0..payload_len],
  1310. };
  1311. Ok(self.icmpv6_reply(ipv6_repr, icmp_reply_repr))
  1312. }
  1313. }
  1314. }
  1315. #[cfg(feature = "proto-ipv4")]
  1316. fn process_ipv4<'frame, T: AsRef<[u8]> + ?Sized>(
  1317. &mut self,
  1318. cx: &Context,
  1319. sockets: &mut SocketSet,
  1320. ipv4_packet: &Ipv4Packet<&'frame T>,
  1321. ) -> Result<Option<IpPacket<'frame>>> {
  1322. let ipv4_repr = Ipv4Repr::parse(ipv4_packet, &cx.caps.checksum)?;
  1323. if !self.is_unicast_v4(ipv4_repr.src_addr) {
  1324. // Discard packets with non-unicast source addresses.
  1325. net_debug!("non-unicast source address");
  1326. return Err(Error::Malformed);
  1327. }
  1328. let ip_repr = IpRepr::Ipv4(ipv4_repr);
  1329. let ip_payload = ipv4_packet.payload();
  1330. #[cfg(feature = "socket-raw")]
  1331. let handled_by_raw_socket = self.raw_socket_filter(cx, sockets, &ip_repr, ip_payload);
  1332. #[cfg(not(feature = "socket-raw"))]
  1333. let handled_by_raw_socket = false;
  1334. #[cfg(feature = "socket-dhcpv4")]
  1335. {
  1336. if ipv4_repr.protocol == IpProtocol::Udp && self.hardware_addr.is_some() {
  1337. // First check for source and dest ports, then do `UdpRepr::parse` if they match.
  1338. // This way we avoid validating the UDP checksum twice for all non-DHCP UDP packets (one here, one in `process_udp`)
  1339. let udp_packet = UdpPacket::new_checked(ip_payload)?;
  1340. if udp_packet.src_port() == DHCP_SERVER_PORT
  1341. && udp_packet.dst_port() == DHCP_CLIENT_PORT
  1342. {
  1343. if let Some(dhcp_socket) =
  1344. sockets.iter_mut().filter_map(Dhcpv4Socket::downcast).next()
  1345. {
  1346. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1347. let udp_repr =
  1348. UdpRepr::parse(&udp_packet, &src_addr, &dst_addr, &cx.caps.checksum)?;
  1349. let udp_payload = udp_packet.payload();
  1350. match dhcp_socket.process(cx, &ipv4_repr, &udp_repr, udp_payload) {
  1351. // The packet is valid and handled by socket.
  1352. Ok(()) => return Ok(None),
  1353. // The packet is malformed, or the socket buffer is full.
  1354. Err(e) => return Err(e),
  1355. }
  1356. }
  1357. }
  1358. }
  1359. }
  1360. if !self.has_ip_addr(ipv4_repr.dst_addr)
  1361. && !self.has_multicast_group(ipv4_repr.dst_addr)
  1362. && !self.is_broadcast_v4(ipv4_repr.dst_addr)
  1363. {
  1364. // Ignore IP packets not directed at us, or broadcast, or any of the multicast groups.
  1365. // If AnyIP is enabled, also check if the packet is routed locally.
  1366. if !self.any_ip
  1367. || !ipv4_repr.dst_addr.is_unicast()
  1368. || self
  1369. .routes
  1370. .lookup(&IpAddress::Ipv4(ipv4_repr.dst_addr), cx.now)
  1371. .map_or(true, |router_addr| !self.has_ip_addr(router_addr))
  1372. {
  1373. return Ok(None);
  1374. }
  1375. }
  1376. match ipv4_repr.protocol {
  1377. IpProtocol::Icmp => self.process_icmpv4(cx, sockets, ip_repr, ip_payload),
  1378. #[cfg(feature = "proto-igmp")]
  1379. IpProtocol::Igmp => self.process_igmp(cx, ipv4_repr, ip_payload),
  1380. #[cfg(feature = "socket-udp")]
  1381. IpProtocol::Udp => {
  1382. self.process_udp(cx, sockets, ip_repr, handled_by_raw_socket, ip_payload)
  1383. }
  1384. #[cfg(feature = "socket-tcp")]
  1385. IpProtocol::Tcp => self.process_tcp(cx, sockets, ip_repr, ip_payload),
  1386. _ if handled_by_raw_socket => Ok(None),
  1387. _ => {
  1388. // Send back as much of the original payload as we can.
  1389. let payload_len =
  1390. icmp_reply_payload_len(ip_payload.len(), IPV4_MIN_MTU, ipv4_repr.buffer_len());
  1391. let icmp_reply_repr = Icmpv4Repr::DstUnreachable {
  1392. reason: Icmpv4DstUnreachable::ProtoUnreachable,
  1393. header: ipv4_repr,
  1394. data: &ip_payload[0..payload_len],
  1395. };
  1396. Ok(self.icmpv4_reply(ipv4_repr, icmp_reply_repr))
  1397. }
  1398. }
  1399. }
  1400. /// Checks if an incoming packet has a broadcast address for the interfaces
  1401. /// associated ipv4 addresses.
  1402. #[cfg(feature = "proto-ipv4")]
  1403. fn is_subnet_broadcast(&self, address: Ipv4Address) -> bool {
  1404. self.ip_addrs
  1405. .iter()
  1406. .filter_map(|own_cidr| match own_cidr {
  1407. IpCidr::Ipv4(own_ip) => Some(own_ip.broadcast()?),
  1408. #[cfg(feature = "proto-ipv6")]
  1409. IpCidr::Ipv6(_) => None,
  1410. })
  1411. .any(|broadcast_address| address == broadcast_address)
  1412. }
  1413. /// Checks if an ipv4 address is broadcast, taking into account subnet broadcast addresses
  1414. #[cfg(feature = "proto-ipv4")]
  1415. fn is_broadcast_v4(&self, address: Ipv4Address) -> bool {
  1416. address.is_broadcast() || self.is_subnet_broadcast(address)
  1417. }
  1418. /// Checks if an ipv4 address is unicast, taking into account subnet broadcast addresses
  1419. #[cfg(feature = "proto-ipv4")]
  1420. fn is_unicast_v4(&self, address: Ipv4Address) -> bool {
  1421. address.is_unicast() && !self.is_subnet_broadcast(address)
  1422. }
  1423. /// Host duties of the **IGMPv2** protocol.
  1424. ///
  1425. /// Sets up `igmp_report_state` for responding to IGMP general/specific membership queries.
  1426. /// Membership must not be reported immediately in order to avoid flooding the network
  1427. /// after a query is broadcasted by a router; this is not currently done.
  1428. #[cfg(feature = "proto-igmp")]
  1429. fn process_igmp<'frame>(
  1430. &mut self,
  1431. cx: &Context,
  1432. ipv4_repr: Ipv4Repr,
  1433. ip_payload: &'frame [u8],
  1434. ) -> Result<Option<IpPacket<'frame>>> {
  1435. let igmp_packet = IgmpPacket::new_checked(ip_payload)?;
  1436. let igmp_repr = IgmpRepr::parse(&igmp_packet)?;
  1437. // FIXME: report membership after a delay
  1438. match igmp_repr {
  1439. IgmpRepr::MembershipQuery {
  1440. group_addr,
  1441. version,
  1442. max_resp_time,
  1443. } => {
  1444. // General query
  1445. if group_addr.is_unspecified()
  1446. && ipv4_repr.dst_addr == Ipv4Address::MULTICAST_ALL_SYSTEMS
  1447. {
  1448. // Are we member in any groups?
  1449. if self.ipv4_multicast_groups.iter().next().is_some() {
  1450. let interval = match version {
  1451. IgmpVersion::Version1 => Duration::from_millis(100),
  1452. IgmpVersion::Version2 => {
  1453. // No dependence on a random generator
  1454. // (see [#24](https://github.com/m-labs/smoltcp/issues/24))
  1455. // but at least spread reports evenly across max_resp_time.
  1456. let intervals = self.ipv4_multicast_groups.len() as u32 + 1;
  1457. max_resp_time / intervals
  1458. }
  1459. };
  1460. self.igmp_report_state = IgmpReportState::ToGeneralQuery {
  1461. version,
  1462. timeout: cx.now + interval,
  1463. interval,
  1464. next_index: 0,
  1465. };
  1466. }
  1467. } else {
  1468. // Group-specific query
  1469. if self.has_multicast_group(group_addr) && ipv4_repr.dst_addr == group_addr {
  1470. // Don't respond immediately
  1471. let timeout = max_resp_time / 4;
  1472. self.igmp_report_state = IgmpReportState::ToSpecificQuery {
  1473. version,
  1474. timeout: cx.now + timeout,
  1475. group: group_addr,
  1476. };
  1477. }
  1478. }
  1479. }
  1480. // Ignore membership reports
  1481. IgmpRepr::MembershipReport { .. } => (),
  1482. // Ignore hosts leaving groups
  1483. IgmpRepr::LeaveGroup { .. } => (),
  1484. }
  1485. Ok(None)
  1486. }
  1487. #[cfg(feature = "proto-ipv6")]
  1488. fn process_icmpv6<'frame>(
  1489. &mut self,
  1490. cx: &Context,
  1491. _sockets: &mut SocketSet,
  1492. ip_repr: IpRepr,
  1493. ip_payload: &'frame [u8],
  1494. ) -> Result<Option<IpPacket<'frame>>> {
  1495. let icmp_packet = Icmpv6Packet::new_checked(ip_payload)?;
  1496. let icmp_repr = Icmpv6Repr::parse(
  1497. &ip_repr.src_addr(),
  1498. &ip_repr.dst_addr(),
  1499. &icmp_packet,
  1500. &cx.caps.checksum,
  1501. )?;
  1502. #[cfg(feature = "socket-icmp")]
  1503. let mut handled_by_icmp_socket = false;
  1504. #[cfg(all(feature = "socket-icmp", feature = "proto-ipv6"))]
  1505. for icmp_socket in _sockets.iter_mut().filter_map(IcmpSocket::downcast) {
  1506. if !icmp_socket.accepts(cx, &ip_repr, &icmp_repr.into()) {
  1507. continue;
  1508. }
  1509. match icmp_socket.process(cx, &ip_repr, &icmp_repr.into()) {
  1510. // The packet is valid and handled by socket.
  1511. Ok(()) => handled_by_icmp_socket = true,
  1512. // The socket buffer is full.
  1513. Err(Error::Exhausted) => (),
  1514. // ICMP sockets don't validate the packets in any way.
  1515. Err(_) => unreachable!(),
  1516. }
  1517. }
  1518. match icmp_repr {
  1519. // Respond to echo requests.
  1520. Icmpv6Repr::EchoRequest {
  1521. ident,
  1522. seq_no,
  1523. data,
  1524. } => match ip_repr {
  1525. IpRepr::Ipv6(ipv6_repr) => {
  1526. let icmp_reply_repr = Icmpv6Repr::EchoReply {
  1527. ident,
  1528. seq_no,
  1529. data,
  1530. };
  1531. Ok(self.icmpv6_reply(ipv6_repr, icmp_reply_repr))
  1532. }
  1533. _ => Err(Error::Unrecognized),
  1534. },
  1535. // Ignore any echo replies.
  1536. Icmpv6Repr::EchoReply { .. } => Ok(None),
  1537. // Forward any NDISC packets to the ndisc packet handler
  1538. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1539. Icmpv6Repr::Ndisc(repr) if ip_repr.hop_limit() == 0xff => match ip_repr {
  1540. IpRepr::Ipv6(ipv6_repr) => self.process_ndisc(cx, ipv6_repr, repr),
  1541. _ => Ok(None),
  1542. },
  1543. // Don't report an error if a packet with unknown type
  1544. // has been handled by an ICMP socket
  1545. #[cfg(feature = "socket-icmp")]
  1546. _ if handled_by_icmp_socket => Ok(None),
  1547. // FIXME: do something correct here?
  1548. _ => Err(Error::Unrecognized),
  1549. }
  1550. }
  1551. #[cfg(all(
  1552. any(feature = "medium-ethernet", feature = "medium-ieee802154"),
  1553. feature = "proto-ipv6"
  1554. ))]
  1555. fn process_ndisc<'frame>(
  1556. &mut self,
  1557. cx: &Context,
  1558. ip_repr: Ipv6Repr,
  1559. repr: NdiscRepr<'frame>,
  1560. ) -> Result<Option<IpPacket<'frame>>> {
  1561. match repr {
  1562. NdiscRepr::NeighborAdvert {
  1563. lladdr,
  1564. target_addr,
  1565. flags,
  1566. } => {
  1567. let ip_addr = ip_repr.src_addr.into();
  1568. if let Some(lladdr) = lladdr {
  1569. let lladdr = lladdr.parse(cx.caps.medium)?;
  1570. if !lladdr.is_unicast() || !target_addr.is_unicast() {
  1571. return Err(Error::Malformed);
  1572. }
  1573. if flags.contains(NdiscNeighborFlags::OVERRIDE)
  1574. || !self
  1575. .neighbor_cache
  1576. .as_mut()
  1577. .unwrap()
  1578. .lookup(&ip_addr, cx.now)
  1579. .found()
  1580. {
  1581. self.neighbor_cache
  1582. .as_mut()
  1583. .unwrap()
  1584. .fill(ip_addr, lladdr, cx.now)
  1585. }
  1586. }
  1587. Ok(None)
  1588. }
  1589. NdiscRepr::NeighborSolicit {
  1590. target_addr,
  1591. lladdr,
  1592. ..
  1593. } => {
  1594. if let Some(lladdr) = lladdr {
  1595. let lladdr = lladdr.parse(cx.caps.medium)?;
  1596. if !lladdr.is_unicast() || !target_addr.is_unicast() {
  1597. return Err(Error::Malformed);
  1598. }
  1599. self.neighbor_cache.as_mut().unwrap().fill(
  1600. ip_repr.src_addr.into(),
  1601. lladdr,
  1602. cx.now,
  1603. );
  1604. }
  1605. if self.has_solicited_node(ip_repr.dst_addr) && self.has_ip_addr(target_addr) {
  1606. let advert = Icmpv6Repr::Ndisc(NdiscRepr::NeighborAdvert {
  1607. flags: NdiscNeighborFlags::SOLICITED,
  1608. target_addr,
  1609. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1610. lladdr: Some(self.hardware_addr.unwrap().into()),
  1611. });
  1612. let ip_repr = Ipv6Repr {
  1613. src_addr: target_addr,
  1614. dst_addr: ip_repr.src_addr,
  1615. next_header: IpProtocol::Icmpv6,
  1616. hop_limit: 0xff,
  1617. payload_len: advert.buffer_len(),
  1618. };
  1619. Ok(Some(IpPacket::Icmpv6((ip_repr, advert))))
  1620. } else {
  1621. Ok(None)
  1622. }
  1623. }
  1624. _ => Ok(None),
  1625. }
  1626. }
  1627. #[cfg(feature = "proto-ipv6")]
  1628. fn process_hopbyhop<'frame>(
  1629. &mut self,
  1630. cx: &Context,
  1631. sockets: &mut SocketSet,
  1632. ipv6_repr: Ipv6Repr,
  1633. handled_by_raw_socket: bool,
  1634. ip_payload: &'frame [u8],
  1635. ) -> Result<Option<IpPacket<'frame>>> {
  1636. let hbh_pkt = Ipv6HopByHopHeader::new_checked(ip_payload)?;
  1637. let hbh_repr = Ipv6HopByHopRepr::parse(&hbh_pkt)?;
  1638. for result in hbh_repr.options() {
  1639. let opt_repr = result?;
  1640. match opt_repr {
  1641. Ipv6OptionRepr::Pad1 | Ipv6OptionRepr::PadN(_) => (),
  1642. Ipv6OptionRepr::Unknown { type_, .. } => {
  1643. match Ipv6OptionFailureType::from(type_) {
  1644. Ipv6OptionFailureType::Skip => (),
  1645. Ipv6OptionFailureType::Discard => {
  1646. return Ok(None);
  1647. }
  1648. _ => {
  1649. // FIXME(dlrobertson): Send an ICMPv6 parameter problem message
  1650. // here.
  1651. return Err(Error::Unrecognized);
  1652. }
  1653. }
  1654. }
  1655. }
  1656. }
  1657. self.process_nxt_hdr(
  1658. cx,
  1659. sockets,
  1660. ipv6_repr,
  1661. hbh_repr.next_header,
  1662. handled_by_raw_socket,
  1663. &ip_payload[hbh_repr.buffer_len()..],
  1664. )
  1665. }
  1666. #[cfg(feature = "proto-ipv4")]
  1667. fn process_icmpv4<'frame>(
  1668. &self,
  1669. cx: &Context,
  1670. _sockets: &mut SocketSet,
  1671. ip_repr: IpRepr,
  1672. ip_payload: &'frame [u8],
  1673. ) -> Result<Option<IpPacket<'frame>>> {
  1674. let icmp_packet = Icmpv4Packet::new_checked(ip_payload)?;
  1675. let icmp_repr = Icmpv4Repr::parse(&icmp_packet, &cx.caps.checksum)?;
  1676. #[cfg(feature = "socket-icmp")]
  1677. let mut handled_by_icmp_socket = false;
  1678. #[cfg(all(feature = "socket-icmp", feature = "proto-ipv4"))]
  1679. for icmp_socket in _sockets.iter_mut().filter_map(IcmpSocket::downcast) {
  1680. if !icmp_socket.accepts(cx, &ip_repr, &icmp_repr.into()) {
  1681. continue;
  1682. }
  1683. match icmp_socket.process(cx, &ip_repr, &icmp_repr.into()) {
  1684. // The packet is valid and handled by socket.
  1685. Ok(()) => handled_by_icmp_socket = true,
  1686. // The socket buffer is full.
  1687. Err(Error::Exhausted) => (),
  1688. // ICMP sockets don't validate the packets in any way.
  1689. Err(_) => unreachable!(),
  1690. }
  1691. }
  1692. match icmp_repr {
  1693. // Respond to echo requests.
  1694. #[cfg(feature = "proto-ipv4")]
  1695. Icmpv4Repr::EchoRequest {
  1696. ident,
  1697. seq_no,
  1698. data,
  1699. } => {
  1700. let icmp_reply_repr = Icmpv4Repr::EchoReply {
  1701. ident,
  1702. seq_no,
  1703. data,
  1704. };
  1705. match ip_repr {
  1706. IpRepr::Ipv4(ipv4_repr) => Ok(self.icmpv4_reply(ipv4_repr, icmp_reply_repr)),
  1707. _ => Err(Error::Unrecognized),
  1708. }
  1709. }
  1710. // Ignore any echo replies.
  1711. Icmpv4Repr::EchoReply { .. } => Ok(None),
  1712. // Don't report an error if a packet with unknown type
  1713. // has been handled by an ICMP socket
  1714. #[cfg(feature = "socket-icmp")]
  1715. _ if handled_by_icmp_socket => Ok(None),
  1716. // FIXME: do something correct here?
  1717. _ => Err(Error::Unrecognized),
  1718. }
  1719. }
  1720. #[cfg(feature = "proto-ipv4")]
  1721. fn icmpv4_reply<'frame, 'icmp: 'frame>(
  1722. &self,
  1723. ipv4_repr: Ipv4Repr,
  1724. icmp_repr: Icmpv4Repr<'icmp>,
  1725. ) -> Option<IpPacket<'frame>> {
  1726. if !self.is_unicast_v4(ipv4_repr.src_addr) {
  1727. // Do not send ICMP replies to non-unicast sources
  1728. None
  1729. } else if self.is_unicast_v4(ipv4_repr.dst_addr) {
  1730. // Reply as normal when src_addr and dst_addr are both unicast
  1731. let ipv4_reply_repr = Ipv4Repr {
  1732. src_addr: ipv4_repr.dst_addr,
  1733. dst_addr: ipv4_repr.src_addr,
  1734. protocol: IpProtocol::Icmp,
  1735. payload_len: icmp_repr.buffer_len(),
  1736. hop_limit: 64,
  1737. };
  1738. Some(IpPacket::Icmpv4((ipv4_reply_repr, icmp_repr)))
  1739. } else if self.is_broadcast_v4(ipv4_repr.dst_addr) {
  1740. // Only reply to broadcasts for echo replies and not other ICMP messages
  1741. match icmp_repr {
  1742. Icmpv4Repr::EchoReply { .. } => match self.ipv4_address() {
  1743. Some(src_addr) => {
  1744. let ipv4_reply_repr = Ipv4Repr {
  1745. src_addr: src_addr,
  1746. dst_addr: ipv4_repr.src_addr,
  1747. protocol: IpProtocol::Icmp,
  1748. payload_len: icmp_repr.buffer_len(),
  1749. hop_limit: 64,
  1750. };
  1751. Some(IpPacket::Icmpv4((ipv4_reply_repr, icmp_repr)))
  1752. }
  1753. None => None,
  1754. },
  1755. _ => None,
  1756. }
  1757. } else {
  1758. None
  1759. }
  1760. }
  1761. #[cfg(feature = "proto-ipv6")]
  1762. fn icmpv6_reply<'frame, 'icmp: 'frame>(
  1763. &self,
  1764. ipv6_repr: Ipv6Repr,
  1765. icmp_repr: Icmpv6Repr<'icmp>,
  1766. ) -> Option<IpPacket<'frame>> {
  1767. if ipv6_repr.dst_addr.is_unicast() {
  1768. let ipv6_reply_repr = Ipv6Repr {
  1769. src_addr: ipv6_repr.dst_addr,
  1770. dst_addr: ipv6_repr.src_addr,
  1771. next_header: IpProtocol::Icmpv6,
  1772. payload_len: icmp_repr.buffer_len(),
  1773. hop_limit: 64,
  1774. };
  1775. Some(IpPacket::Icmpv6((ipv6_reply_repr, icmp_repr)))
  1776. } else {
  1777. // Do not send any ICMP replies to a broadcast destination address.
  1778. None
  1779. }
  1780. }
  1781. #[cfg(feature = "socket-udp")]
  1782. fn process_udp<'frame>(
  1783. &self,
  1784. cx: &Context,
  1785. sockets: &mut SocketSet,
  1786. ip_repr: IpRepr,
  1787. handled_by_raw_socket: bool,
  1788. ip_payload: &'frame [u8],
  1789. ) -> Result<Option<IpPacket<'frame>>> {
  1790. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1791. let udp_packet = UdpPacket::new_checked(ip_payload)?;
  1792. let udp_repr = UdpRepr::parse(&udp_packet, &src_addr, &dst_addr, &cx.caps.checksum)?;
  1793. let udp_payload = udp_packet.payload();
  1794. for udp_socket in sockets.iter_mut().filter_map(UdpSocket::downcast) {
  1795. if !udp_socket.accepts(&ip_repr, &udp_repr) {
  1796. continue;
  1797. }
  1798. match udp_socket.process(cx, &ip_repr, &udp_repr, udp_payload) {
  1799. // The packet is valid and handled by socket.
  1800. Ok(()) => return Ok(None),
  1801. // The packet is malformed, or the socket buffer is full.
  1802. Err(e) => return Err(e),
  1803. }
  1804. }
  1805. // The packet wasn't handled by a socket, send an ICMP port unreachable packet.
  1806. match ip_repr {
  1807. #[cfg(feature = "proto-ipv4")]
  1808. IpRepr::Ipv4(_) if handled_by_raw_socket => Ok(None),
  1809. #[cfg(feature = "proto-ipv6")]
  1810. IpRepr::Ipv6(_) if handled_by_raw_socket => Ok(None),
  1811. #[cfg(feature = "proto-ipv4")]
  1812. IpRepr::Ipv4(ipv4_repr) => {
  1813. let payload_len =
  1814. icmp_reply_payload_len(ip_payload.len(), IPV4_MIN_MTU, ipv4_repr.buffer_len());
  1815. let icmpv4_reply_repr = Icmpv4Repr::DstUnreachable {
  1816. reason: Icmpv4DstUnreachable::PortUnreachable,
  1817. header: ipv4_repr,
  1818. data: &ip_payload[0..payload_len],
  1819. };
  1820. Ok(self.icmpv4_reply(ipv4_repr, icmpv4_reply_repr))
  1821. }
  1822. #[cfg(feature = "proto-ipv6")]
  1823. IpRepr::Ipv6(ipv6_repr) => {
  1824. let payload_len =
  1825. icmp_reply_payload_len(ip_payload.len(), IPV6_MIN_MTU, ipv6_repr.buffer_len());
  1826. let icmpv6_reply_repr = Icmpv6Repr::DstUnreachable {
  1827. reason: Icmpv6DstUnreachable::PortUnreachable,
  1828. header: ipv6_repr,
  1829. data: &ip_payload[0..payload_len],
  1830. };
  1831. Ok(self.icmpv6_reply(ipv6_repr, icmpv6_reply_repr))
  1832. }
  1833. IpRepr::Unspecified { .. } => Err(Error::Unaddressable),
  1834. }
  1835. }
  1836. #[cfg(feature = "socket-tcp")]
  1837. fn process_tcp<'frame>(
  1838. &self,
  1839. cx: &Context,
  1840. sockets: &mut SocketSet,
  1841. ip_repr: IpRepr,
  1842. ip_payload: &'frame [u8],
  1843. ) -> Result<Option<IpPacket<'frame>>> {
  1844. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1845. let tcp_packet = TcpPacket::new_checked(ip_payload)?;
  1846. let tcp_repr = TcpRepr::parse(&tcp_packet, &src_addr, &dst_addr, &cx.caps.checksum)?;
  1847. for tcp_socket in sockets.iter_mut().filter_map(TcpSocket::downcast) {
  1848. if !tcp_socket.accepts(&ip_repr, &tcp_repr) {
  1849. continue;
  1850. }
  1851. match tcp_socket.process(cx, &ip_repr, &tcp_repr) {
  1852. // The packet is valid and handled by socket.
  1853. Ok(reply) => return Ok(reply.map(IpPacket::Tcp)),
  1854. // The packet is malformed, or doesn't match the socket state,
  1855. // or the socket buffer is full.
  1856. Err(e) => return Err(e),
  1857. }
  1858. }
  1859. if tcp_repr.control == TcpControl::Rst {
  1860. // Never reply to a TCP RST packet with another TCP RST packet.
  1861. Ok(None)
  1862. } else {
  1863. // The packet wasn't handled by a socket, send a TCP RST packet.
  1864. Ok(Some(IpPacket::Tcp(TcpSocket::rst_reply(
  1865. &ip_repr, &tcp_repr,
  1866. ))))
  1867. }
  1868. }
  1869. #[cfg(feature = "medium-ethernet")]
  1870. fn dispatch<Tx>(&mut self, cx: &Context, tx_token: Tx, packet: EthernetPacket) -> Result<()>
  1871. where
  1872. Tx: TxToken,
  1873. {
  1874. match packet {
  1875. #[cfg(feature = "proto-ipv4")]
  1876. EthernetPacket::Arp(arp_repr) => {
  1877. let dst_hardware_addr = match arp_repr {
  1878. ArpRepr::EthernetIpv4 {
  1879. target_hardware_addr,
  1880. ..
  1881. } => target_hardware_addr,
  1882. };
  1883. self.dispatch_ethernet(cx, tx_token, arp_repr.buffer_len(), |mut frame| {
  1884. frame.set_dst_addr(dst_hardware_addr);
  1885. frame.set_ethertype(EthernetProtocol::Arp);
  1886. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  1887. arp_repr.emit(&mut packet);
  1888. })
  1889. }
  1890. EthernetPacket::Ip(packet) => self.dispatch_ip(cx, tx_token, packet),
  1891. }
  1892. }
  1893. #[cfg(feature = "medium-ethernet")]
  1894. fn dispatch_ethernet<Tx, F>(
  1895. &mut self,
  1896. cx: &Context,
  1897. tx_token: Tx,
  1898. buffer_len: usize,
  1899. f: F,
  1900. ) -> Result<()>
  1901. where
  1902. Tx: TxToken,
  1903. F: FnOnce(EthernetFrame<&mut [u8]>),
  1904. {
  1905. let tx_len = EthernetFrame::<&[u8]>::buffer_len(buffer_len);
  1906. tx_token.consume(cx.now, tx_len, |tx_buffer| {
  1907. debug_assert!(tx_buffer.as_ref().len() == tx_len);
  1908. let mut frame = EthernetFrame::new_unchecked(tx_buffer);
  1909. let src_addr = if let Some(HardwareAddress::Ethernet(addr)) = self.hardware_addr {
  1910. addr
  1911. } else {
  1912. return Err(Error::Malformed);
  1913. };
  1914. frame.set_src_addr(src_addr);
  1915. f(frame);
  1916. Ok(())
  1917. })
  1918. }
  1919. fn in_same_network(&self, addr: &IpAddress) -> bool {
  1920. self.ip_addrs.iter().any(|cidr| cidr.contains_addr(addr))
  1921. }
  1922. fn route(&self, addr: &IpAddress, timestamp: Instant) -> Result<IpAddress> {
  1923. // Send directly.
  1924. if self.in_same_network(addr) || addr.is_broadcast() {
  1925. return Ok(*addr);
  1926. }
  1927. // Route via a router.
  1928. match self.routes.lookup(addr, timestamp) {
  1929. Some(router_addr) => Ok(router_addr),
  1930. None => Err(Error::Unaddressable),
  1931. }
  1932. }
  1933. fn has_neighbor(&self, cx: &Context, addr: &IpAddress) -> bool {
  1934. match self.route(addr, cx.now) {
  1935. Ok(_routed_addr) => match cx.caps.medium {
  1936. #[cfg(feature = "medium-ethernet")]
  1937. Medium::Ethernet => self
  1938. .neighbor_cache
  1939. .as_ref()
  1940. .unwrap()
  1941. .lookup(&_routed_addr, cx.now)
  1942. .found(),
  1943. #[cfg(feature = "medium-ieee802154")]
  1944. Medium::Ieee802154 => self
  1945. .neighbor_cache
  1946. .as_ref()
  1947. .unwrap()
  1948. .lookup(&_routed_addr, cx.now)
  1949. .found(),
  1950. #[cfg(feature = "medium-ip")]
  1951. Medium::Ip => true,
  1952. },
  1953. Err(_) => false,
  1954. }
  1955. }
  1956. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1957. fn lookup_hardware_addr<Tx>(
  1958. &mut self,
  1959. cx: &Context,
  1960. tx_token: Tx,
  1961. src_addr: &IpAddress,
  1962. dst_addr: &IpAddress,
  1963. ) -> Result<(HardwareAddress, Tx)>
  1964. where
  1965. Tx: TxToken,
  1966. {
  1967. if dst_addr.is_broadcast() {
  1968. let hardware_addr = match cx.caps.medium {
  1969. #[cfg(feature = "medium-ethernet")]
  1970. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::BROADCAST),
  1971. #[cfg(feature = "medium-ieee802154")]
  1972. Medium::Ieee802154 => HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST),
  1973. #[cfg(feature = "medium-ip")]
  1974. Medium::Ip => unreachable!(),
  1975. };
  1976. return Ok((hardware_addr, tx_token));
  1977. }
  1978. if dst_addr.is_multicast() {
  1979. let b = dst_addr.as_bytes();
  1980. let hardware_addr = match *dst_addr {
  1981. IpAddress::Unspecified => unreachable!(),
  1982. #[cfg(feature = "proto-ipv4")]
  1983. IpAddress::Ipv4(_addr) => {
  1984. HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1985. 0x01,
  1986. 0x00,
  1987. 0x5e,
  1988. b[1] & 0x7F,
  1989. b[2],
  1990. b[3],
  1991. ]))
  1992. }
  1993. #[cfg(feature = "proto-ipv6")]
  1994. IpAddress::Ipv6(_addr) => match cx.caps.medium {
  1995. #[cfg(feature = "medium-ethernet")]
  1996. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1997. 0x33, 0x33, b[12], b[13], b[14], b[15],
  1998. ])),
  1999. #[cfg(feature = "medium-ieee802154")]
  2000. Medium::Ieee802154 => {
  2001. // Not sure if this is correct
  2002. HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST)
  2003. }
  2004. #[cfg(feature = "medium-ip")]
  2005. Medium::Ip => unreachable!(),
  2006. },
  2007. };
  2008. return Ok((hardware_addr, tx_token));
  2009. }
  2010. let dst_addr = self.route(dst_addr, cx.now)?;
  2011. match self
  2012. .neighbor_cache
  2013. .as_mut()
  2014. .unwrap()
  2015. .lookup(&dst_addr, cx.now)
  2016. {
  2017. NeighborAnswer::Found(hardware_addr) => return Ok((hardware_addr, tx_token)),
  2018. NeighborAnswer::RateLimited => return Err(Error::Unaddressable),
  2019. _ => (), // XXX
  2020. }
  2021. match (src_addr, dst_addr) {
  2022. #[cfg(feature = "proto-ipv4")]
  2023. (&IpAddress::Ipv4(src_addr), IpAddress::Ipv4(dst_addr)) => {
  2024. net_debug!(
  2025. "address {} not in neighbor cache, sending ARP request",
  2026. dst_addr
  2027. );
  2028. let src_hardware_addr =
  2029. if let Some(HardwareAddress::Ethernet(addr)) = self.hardware_addr {
  2030. addr
  2031. } else {
  2032. return Err(Error::Malformed);
  2033. };
  2034. let arp_repr = ArpRepr::EthernetIpv4 {
  2035. operation: ArpOperation::Request,
  2036. source_hardware_addr: src_hardware_addr,
  2037. source_protocol_addr: src_addr,
  2038. target_hardware_addr: EthernetAddress::BROADCAST,
  2039. target_protocol_addr: dst_addr,
  2040. };
  2041. self.dispatch_ethernet(cx, tx_token, arp_repr.buffer_len(), |mut frame| {
  2042. frame.set_dst_addr(EthernetAddress::BROADCAST);
  2043. frame.set_ethertype(EthernetProtocol::Arp);
  2044. arp_repr.emit(&mut ArpPacket::new_unchecked(frame.payload_mut()))
  2045. })?;
  2046. }
  2047. #[cfg(feature = "proto-ipv6")]
  2048. (&IpAddress::Ipv6(src_addr), IpAddress::Ipv6(dst_addr)) => {
  2049. net_debug!(
  2050. "address {} not in neighbor cache, sending Neighbor Solicitation",
  2051. dst_addr
  2052. );
  2053. let solicit = Icmpv6Repr::Ndisc(NdiscRepr::NeighborSolicit {
  2054. target_addr: dst_addr,
  2055. lladdr: Some(self.hardware_addr.unwrap().into()),
  2056. });
  2057. let packet = IpPacket::Icmpv6((
  2058. Ipv6Repr {
  2059. src_addr,
  2060. dst_addr: dst_addr.solicited_node(),
  2061. next_header: IpProtocol::Icmpv6,
  2062. payload_len: solicit.buffer_len(),
  2063. hop_limit: 0xff,
  2064. },
  2065. solicit,
  2066. ));
  2067. self.dispatch_ip(cx, tx_token, packet)?;
  2068. }
  2069. _ => (),
  2070. }
  2071. // The request got dispatched, limit the rate on the cache.
  2072. self.neighbor_cache.as_mut().unwrap().limit_rate(cx.now);
  2073. Err(Error::Unaddressable)
  2074. }
  2075. fn flush_cache(&mut self) {
  2076. if let Some(cache) = self.neighbor_cache.as_mut() {
  2077. cache.flush()
  2078. }
  2079. }
  2080. fn dispatch_ip<Tx: TxToken>(
  2081. &mut self,
  2082. cx: &Context,
  2083. tx_token: Tx,
  2084. packet: IpPacket,
  2085. ) -> Result<()> {
  2086. let ip_repr = packet.ip_repr().lower(&self.ip_addrs)?;
  2087. match cx.caps.medium {
  2088. #[cfg(feature = "medium-ethernet")]
  2089. Medium::Ethernet => {
  2090. let (dst_hardware_addr, tx_token) = match self.lookup_hardware_addr(
  2091. cx,
  2092. tx_token,
  2093. &ip_repr.src_addr(),
  2094. &ip_repr.dst_addr(),
  2095. )? {
  2096. (HardwareAddress::Ethernet(addr), tx_token) => (addr, tx_token),
  2097. #[cfg(feature = "medium-ieee802154")]
  2098. (HardwareAddress::Ieee802154(_), _) => unreachable!(),
  2099. };
  2100. self.dispatch_ethernet(cx, tx_token, ip_repr.total_len(), |mut frame| {
  2101. frame.set_dst_addr(dst_hardware_addr);
  2102. match ip_repr {
  2103. #[cfg(feature = "proto-ipv4")]
  2104. IpRepr::Ipv4(_) => frame.set_ethertype(EthernetProtocol::Ipv4),
  2105. #[cfg(feature = "proto-ipv6")]
  2106. IpRepr::Ipv6(_) => frame.set_ethertype(EthernetProtocol::Ipv6),
  2107. _ => return,
  2108. }
  2109. ip_repr.emit(frame.payload_mut(), &cx.caps.checksum);
  2110. let payload = &mut frame.payload_mut()[ip_repr.buffer_len()..];
  2111. packet.emit_payload(ip_repr, payload, &cx.caps);
  2112. })
  2113. }
  2114. #[cfg(feature = "medium-ip")]
  2115. Medium::Ip => {
  2116. let tx_len = ip_repr.total_len();
  2117. tx_token.consume(cx.now, tx_len, |mut tx_buffer| {
  2118. debug_assert!(tx_buffer.as_ref().len() == tx_len);
  2119. ip_repr.emit(&mut tx_buffer, &cx.caps.checksum);
  2120. let payload = &mut tx_buffer[ip_repr.buffer_len()..];
  2121. packet.emit_payload(ip_repr, payload, &cx.caps);
  2122. Ok(())
  2123. })
  2124. }
  2125. #[cfg(feature = "medium-ieee802154")]
  2126. Medium::Ieee802154 => self.dispatch_ieee802154(cx, tx_token, packet),
  2127. }
  2128. }
  2129. #[cfg(feature = "medium-ieee802154")]
  2130. fn dispatch_ieee802154<Tx: TxToken>(
  2131. &mut self,
  2132. cx: &Context,
  2133. tx_token: Tx,
  2134. packet: IpPacket,
  2135. ) -> Result<()> {
  2136. let ip_repr = packet.ip_repr().lower(&self.ip_addrs)?;
  2137. match cx.caps.medium {
  2138. #[cfg(feature = "medium-ieee802154")]
  2139. Medium::Ieee802154 => {
  2140. let (dst_hardware_addr, tx_token) = match self.lookup_hardware_addr(
  2141. cx,
  2142. tx_token,
  2143. &ip_repr.src_addr(),
  2144. &ip_repr.dst_addr(),
  2145. )? {
  2146. (HardwareAddress::Ieee802154(addr), tx_token) => (addr, tx_token),
  2147. _ => unreachable!(),
  2148. };
  2149. let ack_request = dst_hardware_addr.is_unicast();
  2150. let ack_request = match packet {
  2151. IpPacket::Icmpv6(_) => false,
  2152. _ => ack_request,
  2153. };
  2154. let mut tx_len = 0;
  2155. let ll_src_addr =
  2156. if let Some(HardwareAddress::Ieee802154(addr)) = self.hardware_addr {
  2157. Some(addr)
  2158. } else {
  2159. return Err(Error::Malformed);
  2160. };
  2161. let ieee_repr = Ieee802154Repr {
  2162. frame_type: Ieee802154FrameType::Data,
  2163. security_enabled: false,
  2164. frame_pending: false,
  2165. ack_request,
  2166. sequence_number: Some(self.get_sequence_number()),
  2167. pan_id_compression: true,
  2168. frame_version: Ieee802154FrameVersion::Ieee802154_2003,
  2169. dst_pan_id: cx.pan_id,
  2170. dst_addr: Some(dst_hardware_addr),
  2171. src_pan_id: cx.pan_id,
  2172. src_addr: ll_src_addr,
  2173. };
  2174. let (src_addr, dst_addr) = match (ip_repr.src_addr(), ip_repr.dst_addr()) {
  2175. (IpAddress::Ipv6(src_addr), IpAddress::Ipv6(dst_addr)) => (src_addr, dst_addr),
  2176. _ => return Err(Error::Unaddressable),
  2177. };
  2178. let next_header = match &packet {
  2179. IpPacket::Udp(_) => SixlowpanNextHeader::Compressed,
  2180. IpPacket::Icmpv6(_) => SixlowpanNextHeader::Uncompressed(IpProtocol::Icmpv6),
  2181. _ => return Err(Error::Unrecognized),
  2182. };
  2183. let hop_limit = match packet {
  2184. IpPacket::Icmpv6((_, Icmpv6Repr::Ndisc(_))) => 255,
  2185. IpPacket::Icmpv6((_, Icmpv6Repr::EchoReply { .. })) => 64,
  2186. IpPacket::Udp(..) => 64,
  2187. _ => return Err(Error::Unrecognized),
  2188. };
  2189. let iphc_repr = SixlowpanIphcRepr {
  2190. src_addr,
  2191. ll_src_addr,
  2192. dst_addr,
  2193. ll_dst_addr: Some(dst_hardware_addr),
  2194. next_header,
  2195. hop_limit,
  2196. };
  2197. tx_len += ieee_repr.buffer_len();
  2198. tx_len += iphc_repr.buffer_len();
  2199. match &packet {
  2200. IpPacket::Udp((_, udp_repr, payload)) => {
  2201. let udp_repr = SixlowpanUdpRepr(*udp_repr);
  2202. tx_len += udp_repr.header_len() + payload.len();
  2203. }
  2204. IpPacket::Icmpv6((_, icmp)) => {
  2205. tx_len += icmp.buffer_len();
  2206. }
  2207. _ => return Err(Error::Unrecognized),
  2208. }
  2209. tx_token.consume(cx.now, tx_len, |mut tx_buffer| {
  2210. // 1. Create the header of 802.15.4
  2211. let mut ieee_packet = Ieee802154Frame::new_unchecked(&mut tx_buffer);
  2212. ieee_repr.emit(&mut ieee_packet);
  2213. let mut start = ieee_repr.buffer_len();
  2214. // 2. Create the header for 6LoWPAN IPHC
  2215. let mut iphc_packet =
  2216. SixlowpanIphcPacket::new_unchecked(&mut tx_buffer[start..tx_len]);
  2217. iphc_repr.emit(&mut iphc_packet);
  2218. start += iphc_repr.buffer_len();
  2219. match packet {
  2220. IpPacket::Udp((_, udp_repr, payload)) => {
  2221. // 3. Create the header for 6LoWPAN UDP
  2222. let mut udp_packet =
  2223. SixlowpanUdpPacket::new_unchecked(&mut tx_buffer[start..tx_len]);
  2224. SixlowpanUdpRepr(udp_repr).emit(
  2225. &mut udp_packet,
  2226. &iphc_repr.src_addr,
  2227. &iphc_repr.dst_addr,
  2228. payload.len(),
  2229. |buf| buf.copy_from_slice(payload),
  2230. );
  2231. }
  2232. IpPacket::Icmpv6((_, icmp_repr)) => {
  2233. // 3. Create the header for ICMPv6
  2234. let mut icmp_packet =
  2235. Icmpv6Packet::new_unchecked(&mut tx_buffer[start..tx_len]);
  2236. icmp_repr.emit(
  2237. &iphc_repr.src_addr.into(),
  2238. &iphc_repr.dst_addr.into(),
  2239. &mut icmp_packet,
  2240. &cx.caps.checksum,
  2241. );
  2242. }
  2243. _ => return Err(Error::Unrecognized),
  2244. }
  2245. Ok(())
  2246. })
  2247. }
  2248. _ => Err(Error::NotSupported),
  2249. }
  2250. }
  2251. #[cfg(feature = "proto-igmp")]
  2252. fn igmp_report_packet<'any>(
  2253. &self,
  2254. version: IgmpVersion,
  2255. group_addr: Ipv4Address,
  2256. ) -> Option<IpPacket<'any>> {
  2257. let iface_addr = self.ipv4_address()?;
  2258. let igmp_repr = IgmpRepr::MembershipReport {
  2259. group_addr,
  2260. version,
  2261. };
  2262. let pkt = IpPacket::Igmp((
  2263. Ipv4Repr {
  2264. src_addr: iface_addr,
  2265. // Send to the group being reported
  2266. dst_addr: group_addr,
  2267. protocol: IpProtocol::Igmp,
  2268. payload_len: igmp_repr.buffer_len(),
  2269. hop_limit: 1,
  2270. // TODO: add Router Alert IPv4 header option. See
  2271. // [#183](https://github.com/m-labs/smoltcp/issues/183).
  2272. },
  2273. igmp_repr,
  2274. ));
  2275. Some(pkt)
  2276. }
  2277. #[cfg(feature = "proto-igmp")]
  2278. fn igmp_leave_packet<'any>(&self, group_addr: Ipv4Address) -> Option<IpPacket<'any>> {
  2279. self.ipv4_address().map(|iface_addr| {
  2280. let igmp_repr = IgmpRepr::LeaveGroup { group_addr };
  2281. IpPacket::Igmp((
  2282. Ipv4Repr {
  2283. src_addr: iface_addr,
  2284. dst_addr: Ipv4Address::MULTICAST_ALL_ROUTERS,
  2285. protocol: IpProtocol::Igmp,
  2286. payload_len: igmp_repr.buffer_len(),
  2287. hop_limit: 1,
  2288. },
  2289. igmp_repr,
  2290. ))
  2291. })
  2292. }
  2293. }
  2294. #[cfg(test)]
  2295. mod test {
  2296. use std::collections::BTreeMap;
  2297. #[cfg(feature = "proto-igmp")]
  2298. use std::vec::Vec;
  2299. use super::*;
  2300. use crate::iface::Interface;
  2301. #[cfg(feature = "medium-ethernet")]
  2302. use crate::iface::NeighborCache;
  2303. use crate::phy::{ChecksumCapabilities, Loopback};
  2304. #[cfg(feature = "proto-igmp")]
  2305. use crate::time::Instant;
  2306. use crate::{Error, Result};
  2307. #[allow(unused)]
  2308. fn fill_slice(s: &mut [u8], val: u8) {
  2309. for x in s.iter_mut() {
  2310. *x = val
  2311. }
  2312. }
  2313. fn create_loopback<'a>() -> Interface<'a, Loopback> {
  2314. #[cfg(feature = "medium-ethernet")]
  2315. return create_loopback_ethernet();
  2316. #[cfg(not(feature = "medium-ethernet"))]
  2317. return create_loopback_ip();
  2318. }
  2319. #[cfg(all(feature = "medium-ip"))]
  2320. #[allow(unused)]
  2321. fn create_loopback_ip<'a>() -> Interface<'a, Loopback> {
  2322. // Create a basic device
  2323. let device = Loopback::new(Medium::Ip);
  2324. let ip_addrs = [
  2325. #[cfg(feature = "proto-ipv4")]
  2326. IpCidr::new(IpAddress::v4(127, 0, 0, 1), 8),
  2327. #[cfg(feature = "proto-ipv6")]
  2328. IpCidr::new(IpAddress::v6(0, 0, 0, 0, 0, 0, 0, 1), 128),
  2329. #[cfg(feature = "proto-ipv6")]
  2330. IpCidr::new(IpAddress::v6(0xfdbe, 0, 0, 0, 0, 0, 0, 1), 64),
  2331. ];
  2332. let iface_builder = InterfaceBuilder::new(device, vec![]).ip_addrs(ip_addrs);
  2333. #[cfg(feature = "proto-igmp")]
  2334. let iface_builder = iface_builder.ipv4_multicast_groups(BTreeMap::new());
  2335. iface_builder.finalize()
  2336. }
  2337. #[cfg(all(feature = "medium-ethernet"))]
  2338. fn create_loopback_ethernet<'a>() -> Interface<'a, Loopback> {
  2339. // Create a basic device
  2340. let device = Loopback::new(Medium::Ethernet);
  2341. let ip_addrs = [
  2342. #[cfg(feature = "proto-ipv4")]
  2343. IpCidr::new(IpAddress::v4(127, 0, 0, 1), 8),
  2344. #[cfg(feature = "proto-ipv6")]
  2345. IpCidr::new(IpAddress::v6(0, 0, 0, 0, 0, 0, 0, 1), 128),
  2346. #[cfg(feature = "proto-ipv6")]
  2347. IpCidr::new(IpAddress::v6(0xfdbe, 0, 0, 0, 0, 0, 0, 1), 64),
  2348. ];
  2349. let iface_builder = InterfaceBuilder::new(device, vec![])
  2350. .hardware_addr(EthernetAddress::default().into())
  2351. .neighbor_cache(NeighborCache::new(BTreeMap::new()))
  2352. .ip_addrs(ip_addrs);
  2353. #[cfg(feature = "proto-igmp")]
  2354. let iface_builder = iface_builder.ipv4_multicast_groups(BTreeMap::new());
  2355. iface_builder.finalize()
  2356. }
  2357. #[cfg(feature = "proto-igmp")]
  2358. fn recv_all(iface: &mut Interface<'_, Loopback>, timestamp: Instant) -> Vec<Vec<u8>> {
  2359. let mut pkts = Vec::new();
  2360. while let Some((rx, _tx)) = iface.device.receive() {
  2361. rx.consume(timestamp, |pkt| {
  2362. pkts.push(pkt.to_vec());
  2363. Ok(())
  2364. })
  2365. .unwrap();
  2366. }
  2367. pkts
  2368. }
  2369. #[derive(Debug, PartialEq)]
  2370. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  2371. struct MockTxToken;
  2372. impl TxToken for MockTxToken {
  2373. fn consume<R, F>(self, _: Instant, _: usize, _: F) -> Result<R>
  2374. where
  2375. F: FnOnce(&mut [u8]) -> Result<R>,
  2376. {
  2377. Err(Error::Unaddressable)
  2378. }
  2379. }
  2380. #[test]
  2381. #[should_panic(expected = "hardware_addr required option was not set")]
  2382. #[cfg(all(feature = "medium-ethernet"))]
  2383. fn test_builder_initialization_panic() {
  2384. InterfaceBuilder::new(Loopback::new(Medium::Ethernet), vec![]).finalize();
  2385. }
  2386. #[test]
  2387. #[cfg(feature = "proto-ipv4")]
  2388. fn test_no_icmp_no_unicast_ipv4() {
  2389. let mut iface = create_loopback();
  2390. // Unknown Ipv4 Protocol
  2391. //
  2392. // Because the destination is the broadcast address
  2393. // this should not trigger and Destination Unreachable
  2394. // response. See RFC 1122 § 3.2.2.
  2395. let repr = IpRepr::Ipv4(Ipv4Repr {
  2396. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2397. dst_addr: Ipv4Address::BROADCAST,
  2398. protocol: IpProtocol::Unknown(0x0c),
  2399. payload_len: 0,
  2400. hop_limit: 0x40,
  2401. });
  2402. let mut bytes = vec![0u8; 54];
  2403. repr.emit(&mut bytes, &ChecksumCapabilities::default());
  2404. let frame = Ipv4Packet::new_unchecked(&bytes);
  2405. // Ensure that the unknown protocol frame does not trigger an
  2406. // ICMP error response when the destination address is a
  2407. // broadcast address
  2408. let cx = iface.context(Instant::from_secs(0));
  2409. assert_eq!(
  2410. iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame),
  2411. Ok(None)
  2412. );
  2413. }
  2414. #[test]
  2415. #[cfg(feature = "proto-ipv6")]
  2416. fn test_no_icmp_no_unicast_ipv6() {
  2417. let mut iface = create_loopback();
  2418. // Unknown Ipv6 Protocol
  2419. //
  2420. // Because the destination is the broadcast address
  2421. // this should not trigger and Destination Unreachable
  2422. // response. See RFC 1122 § 3.2.2.
  2423. let repr = IpRepr::Ipv6(Ipv6Repr {
  2424. src_addr: Ipv6Address::new(0xfe80, 0, 0, 0, 0, 0, 0, 1),
  2425. dst_addr: Ipv6Address::LINK_LOCAL_ALL_NODES,
  2426. next_header: IpProtocol::Unknown(0x0c),
  2427. payload_len: 0,
  2428. hop_limit: 0x40,
  2429. });
  2430. let mut bytes = vec![0u8; 54];
  2431. repr.emit(&mut bytes, &ChecksumCapabilities::default());
  2432. let frame = Ipv6Packet::new_unchecked(&bytes);
  2433. // Ensure that the unknown protocol frame does not trigger an
  2434. // ICMP error response when the destination address is a
  2435. // broadcast address
  2436. let cx = iface.context(Instant::from_secs(0));
  2437. assert_eq!(
  2438. iface.inner.process_ipv6(&cx, &mut iface.sockets, &frame),
  2439. Ok(None)
  2440. );
  2441. }
  2442. #[test]
  2443. #[cfg(feature = "proto-ipv4")]
  2444. fn test_icmp_error_no_payload() {
  2445. static NO_BYTES: [u8; 0] = [];
  2446. let mut iface = create_loopback();
  2447. // Unknown Ipv4 Protocol with no payload
  2448. let repr = IpRepr::Ipv4(Ipv4Repr {
  2449. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2450. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2451. protocol: IpProtocol::Unknown(0x0c),
  2452. payload_len: 0,
  2453. hop_limit: 0x40,
  2454. });
  2455. let mut bytes = vec![0u8; 34];
  2456. repr.emit(&mut bytes, &ChecksumCapabilities::default());
  2457. let frame = Ipv4Packet::new_unchecked(&bytes);
  2458. // The expected Destination Unreachable response due to the
  2459. // unknown protocol
  2460. let icmp_repr = Icmpv4Repr::DstUnreachable {
  2461. reason: Icmpv4DstUnreachable::ProtoUnreachable,
  2462. header: Ipv4Repr {
  2463. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2464. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2465. protocol: IpProtocol::Unknown(12),
  2466. payload_len: 0,
  2467. hop_limit: 64,
  2468. },
  2469. data: &NO_BYTES,
  2470. };
  2471. let expected_repr = IpPacket::Icmpv4((
  2472. Ipv4Repr {
  2473. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2474. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2475. protocol: IpProtocol::Icmp,
  2476. payload_len: icmp_repr.buffer_len(),
  2477. hop_limit: 64,
  2478. },
  2479. icmp_repr,
  2480. ));
  2481. // Ensure that the unknown protocol triggers an error response.
  2482. // And we correctly handle no payload.
  2483. let cx = iface.context(Instant::from_secs(0));
  2484. assert_eq!(
  2485. iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame),
  2486. Ok(Some(expected_repr))
  2487. );
  2488. }
  2489. #[test]
  2490. #[cfg(feature = "proto-ipv4")]
  2491. fn test_local_subnet_broadcasts() {
  2492. let mut iface = create_loopback();
  2493. iface.update_ip_addrs(|addrs| {
  2494. addrs.iter_mut().next().map(|addr| {
  2495. *addr = IpCidr::Ipv4(Ipv4Cidr::new(Ipv4Address([192, 168, 1, 23]), 24));
  2496. });
  2497. });
  2498. assert!(iface
  2499. .inner
  2500. .is_subnet_broadcast(Ipv4Address([192, 168, 1, 255])),);
  2501. assert!(!iface
  2502. .inner
  2503. .is_subnet_broadcast(Ipv4Address([192, 168, 1, 254])),);
  2504. iface.update_ip_addrs(|addrs| {
  2505. addrs.iter_mut().next().map(|addr| {
  2506. *addr = IpCidr::Ipv4(Ipv4Cidr::new(Ipv4Address([192, 168, 23, 24]), 16));
  2507. });
  2508. });
  2509. assert!(!iface
  2510. .inner
  2511. .is_subnet_broadcast(Ipv4Address([192, 168, 23, 255])),);
  2512. assert!(!iface
  2513. .inner
  2514. .is_subnet_broadcast(Ipv4Address([192, 168, 23, 254])),);
  2515. assert!(!iface
  2516. .inner
  2517. .is_subnet_broadcast(Ipv4Address([192, 168, 255, 254])),);
  2518. assert!(iface
  2519. .inner
  2520. .is_subnet_broadcast(Ipv4Address([192, 168, 255, 255])),);
  2521. iface.update_ip_addrs(|addrs| {
  2522. addrs.iter_mut().next().map(|addr| {
  2523. *addr = IpCidr::Ipv4(Ipv4Cidr::new(Ipv4Address([192, 168, 23, 24]), 8));
  2524. });
  2525. });
  2526. assert!(!iface
  2527. .inner
  2528. .is_subnet_broadcast(Ipv4Address([192, 23, 1, 255])),);
  2529. assert!(!iface
  2530. .inner
  2531. .is_subnet_broadcast(Ipv4Address([192, 23, 1, 254])),);
  2532. assert!(!iface
  2533. .inner
  2534. .is_subnet_broadcast(Ipv4Address([192, 255, 255, 254])),);
  2535. assert!(iface
  2536. .inner
  2537. .is_subnet_broadcast(Ipv4Address([192, 255, 255, 255])),);
  2538. }
  2539. #[test]
  2540. #[cfg(all(feature = "socket-udp", feature = "proto-ipv4"))]
  2541. fn test_icmp_error_port_unreachable() {
  2542. static UDP_PAYLOAD: [u8; 12] = [
  2543. 0x48, 0x65, 0x6c, 0x6c, 0x6f, 0x2c, 0x20, 0x57, 0x6f, 0x6c, 0x64, 0x21,
  2544. ];
  2545. let mut iface = create_loopback();
  2546. let mut udp_bytes_unicast = vec![0u8; 20];
  2547. let mut udp_bytes_broadcast = vec![0u8; 20];
  2548. let mut packet_unicast = UdpPacket::new_unchecked(&mut udp_bytes_unicast);
  2549. let mut packet_broadcast = UdpPacket::new_unchecked(&mut udp_bytes_broadcast);
  2550. let udp_repr = UdpRepr {
  2551. src_port: 67,
  2552. dst_port: 68,
  2553. };
  2554. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  2555. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2556. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2557. protocol: IpProtocol::Udp,
  2558. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  2559. hop_limit: 64,
  2560. });
  2561. // Emit the representations to a packet
  2562. udp_repr.emit(
  2563. &mut packet_unicast,
  2564. &ip_repr.src_addr(),
  2565. &ip_repr.dst_addr(),
  2566. UDP_PAYLOAD.len(),
  2567. |buf| buf.copy_from_slice(&UDP_PAYLOAD),
  2568. &ChecksumCapabilities::default(),
  2569. );
  2570. let data = packet_unicast.into_inner();
  2571. // The expected Destination Unreachable ICMPv4 error response due
  2572. // to no sockets listening on the destination port.
  2573. let icmp_repr = Icmpv4Repr::DstUnreachable {
  2574. reason: Icmpv4DstUnreachable::PortUnreachable,
  2575. header: Ipv4Repr {
  2576. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2577. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2578. protocol: IpProtocol::Udp,
  2579. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  2580. hop_limit: 64,
  2581. },
  2582. data: data,
  2583. };
  2584. let expected_repr = IpPacket::Icmpv4((
  2585. Ipv4Repr {
  2586. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  2587. dst_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2588. protocol: IpProtocol::Icmp,
  2589. payload_len: icmp_repr.buffer_len(),
  2590. hop_limit: 64,
  2591. },
  2592. icmp_repr,
  2593. ));
  2594. // Ensure that the unknown protocol triggers an error response.
  2595. // And we correctly handle no payload.
  2596. let cx = iface.context(Instant::from_secs(0));
  2597. assert_eq!(
  2598. iface
  2599. .inner
  2600. .process_udp(&cx, &mut iface.sockets, ip_repr, false, data),
  2601. Ok(Some(expected_repr))
  2602. );
  2603. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  2604. src_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x02]),
  2605. dst_addr: Ipv4Address::BROADCAST,
  2606. protocol: IpProtocol::Udp,
  2607. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  2608. hop_limit: 64,
  2609. });
  2610. // Emit the representations to a packet
  2611. udp_repr.emit(
  2612. &mut packet_broadcast,
  2613. &ip_repr.src_addr(),
  2614. &IpAddress::Ipv4(Ipv4Address::BROADCAST),
  2615. UDP_PAYLOAD.len(),
  2616. |buf| buf.copy_from_slice(&UDP_PAYLOAD),
  2617. &ChecksumCapabilities::default(),
  2618. );
  2619. // Ensure that the port unreachable error does not trigger an
  2620. // ICMP error response when the destination address is a
  2621. // broadcast address and no socket is bound to the port.
  2622. assert_eq!(
  2623. iface.inner.process_udp(
  2624. &cx,
  2625. &mut iface.sockets,
  2626. ip_repr,
  2627. false,
  2628. packet_broadcast.into_inner()
  2629. ),
  2630. Ok(None)
  2631. );
  2632. }
  2633. #[test]
  2634. #[cfg(feature = "socket-udp")]
  2635. fn test_handle_udp_broadcast() {
  2636. use crate::socket::{UdpPacketMetadata, UdpSocket, UdpSocketBuffer};
  2637. use crate::wire::IpEndpoint;
  2638. static UDP_PAYLOAD: [u8; 5] = [0x48, 0x65, 0x6c, 0x6c, 0x6f];
  2639. let mut iface = create_loopback();
  2640. let rx_buffer = UdpSocketBuffer::new(vec![UdpPacketMetadata::EMPTY], vec![0; 15]);
  2641. let tx_buffer = UdpSocketBuffer::new(vec![UdpPacketMetadata::EMPTY], vec![0; 15]);
  2642. let udp_socket = UdpSocket::new(rx_buffer, tx_buffer);
  2643. let mut udp_bytes = vec![0u8; 13];
  2644. let mut packet = UdpPacket::new_unchecked(&mut udp_bytes);
  2645. let socket_handle = iface.add_socket(udp_socket);
  2646. #[cfg(feature = "proto-ipv6")]
  2647. let src_ip = Ipv6Address::new(0xfe80, 0, 0, 0, 0, 0, 0, 1);
  2648. #[cfg(all(not(feature = "proto-ipv6"), feature = "proto-ipv4"))]
  2649. let src_ip = Ipv4Address::new(0x7f, 0x00, 0x00, 0x02);
  2650. let udp_repr = UdpRepr {
  2651. src_port: 67,
  2652. dst_port: 68,
  2653. };
  2654. #[cfg(feature = "proto-ipv6")]
  2655. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  2656. src_addr: src_ip,
  2657. dst_addr: Ipv6Address::LINK_LOCAL_ALL_NODES,
  2658. next_header: IpProtocol::Udp,
  2659. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  2660. hop_limit: 0x40,
  2661. });
  2662. #[cfg(all(not(feature = "proto-ipv6"), feature = "proto-ipv4"))]
  2663. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  2664. src_addr: src_ip,
  2665. dst_addr: Ipv4Address::BROADCAST,
  2666. protocol: IpProtocol::Udp,
  2667. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  2668. hop_limit: 0x40,
  2669. });
  2670. // Bind the socket to port 68
  2671. let socket = iface.get_socket::<UdpSocket>(socket_handle);
  2672. assert_eq!(socket.bind(68), Ok(()));
  2673. assert!(!socket.can_recv());
  2674. assert!(socket.can_send());
  2675. udp_repr.emit(
  2676. &mut packet,
  2677. &ip_repr.src_addr(),
  2678. &ip_repr.dst_addr(),
  2679. UDP_PAYLOAD.len(),
  2680. |buf| buf.copy_from_slice(&UDP_PAYLOAD),
  2681. &ChecksumCapabilities::default(),
  2682. );
  2683. // Packet should be handled by bound UDP socket
  2684. let cx = iface.context(Instant::from_secs(0));
  2685. assert_eq!(
  2686. iface
  2687. .inner
  2688. .process_udp(&cx, &mut iface.sockets, ip_repr, false, packet.into_inner()),
  2689. Ok(None)
  2690. );
  2691. // Make sure the payload to the UDP packet processed by process_udp is
  2692. // appended to the bound sockets rx_buffer
  2693. let socket = iface.get_socket::<UdpSocket>(socket_handle);
  2694. assert!(socket.can_recv());
  2695. assert_eq!(
  2696. socket.recv(),
  2697. Ok((&UDP_PAYLOAD[..], IpEndpoint::new(src_ip.into(), 67)))
  2698. );
  2699. }
  2700. #[test]
  2701. #[cfg(feature = "proto-ipv4")]
  2702. fn test_handle_ipv4_broadcast() {
  2703. use crate::wire::{Icmpv4Packet, Icmpv4Repr, Ipv4Packet};
  2704. let mut iface = create_loopback();
  2705. let our_ipv4_addr = iface.ipv4_address().unwrap();
  2706. let src_ipv4_addr = Ipv4Address([127, 0, 0, 2]);
  2707. // ICMPv4 echo request
  2708. let icmpv4_data: [u8; 4] = [0xaa, 0x00, 0x00, 0xff];
  2709. let icmpv4_repr = Icmpv4Repr::EchoRequest {
  2710. ident: 0x1234,
  2711. seq_no: 0xabcd,
  2712. data: &icmpv4_data,
  2713. };
  2714. // Send to IPv4 broadcast address
  2715. let ipv4_repr = Ipv4Repr {
  2716. src_addr: src_ipv4_addr,
  2717. dst_addr: Ipv4Address::BROADCAST,
  2718. protocol: IpProtocol::Icmp,
  2719. hop_limit: 64,
  2720. payload_len: icmpv4_repr.buffer_len(),
  2721. };
  2722. // Emit to ip frame
  2723. let mut bytes = vec![0u8; ipv4_repr.buffer_len() + icmpv4_repr.buffer_len()];
  2724. let frame = {
  2725. ipv4_repr.emit(
  2726. &mut Ipv4Packet::new_unchecked(&mut bytes),
  2727. &ChecksumCapabilities::default(),
  2728. );
  2729. icmpv4_repr.emit(
  2730. &mut Icmpv4Packet::new_unchecked(&mut bytes[ipv4_repr.buffer_len()..]),
  2731. &ChecksumCapabilities::default(),
  2732. );
  2733. Ipv4Packet::new_unchecked(&bytes)
  2734. };
  2735. // Expected ICMPv4 echo reply
  2736. let expected_icmpv4_repr = Icmpv4Repr::EchoReply {
  2737. ident: 0x1234,
  2738. seq_no: 0xabcd,
  2739. data: &icmpv4_data,
  2740. };
  2741. let expected_ipv4_repr = Ipv4Repr {
  2742. src_addr: our_ipv4_addr,
  2743. dst_addr: src_ipv4_addr,
  2744. protocol: IpProtocol::Icmp,
  2745. hop_limit: 64,
  2746. payload_len: expected_icmpv4_repr.buffer_len(),
  2747. };
  2748. let expected_packet = IpPacket::Icmpv4((expected_ipv4_repr, expected_icmpv4_repr));
  2749. let cx = iface.context(Instant::from_secs(0));
  2750. assert_eq!(
  2751. iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame),
  2752. Ok(Some(expected_packet))
  2753. );
  2754. }
  2755. #[test]
  2756. #[cfg(feature = "socket-udp")]
  2757. fn test_icmp_reply_size() {
  2758. #[cfg(feature = "proto-ipv6")]
  2759. use crate::wire::Icmpv6DstUnreachable;
  2760. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2761. use crate::wire::IPV4_MIN_MTU as MIN_MTU;
  2762. #[cfg(feature = "proto-ipv6")]
  2763. use crate::wire::IPV6_MIN_MTU as MIN_MTU;
  2764. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2765. const MAX_PAYLOAD_LEN: usize = 528;
  2766. #[cfg(feature = "proto-ipv6")]
  2767. const MAX_PAYLOAD_LEN: usize = 1192;
  2768. let mut iface = create_loopback();
  2769. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2770. let src_addr = Ipv4Address([192, 168, 1, 1]);
  2771. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2772. let dst_addr = Ipv4Address([192, 168, 1, 2]);
  2773. #[cfg(feature = "proto-ipv6")]
  2774. let src_addr = Ipv6Address::new(0xfe80, 0, 0, 0, 0, 0, 0, 1);
  2775. #[cfg(feature = "proto-ipv6")]
  2776. let dst_addr = Ipv6Address::new(0xfe80, 0, 0, 0, 0, 0, 0, 2);
  2777. // UDP packet that if not tructated will cause a icmp port unreachable reply
  2778. // to exeed the minimum mtu bytes in length.
  2779. let udp_repr = UdpRepr {
  2780. src_port: 67,
  2781. dst_port: 68,
  2782. };
  2783. let mut bytes = vec![0xff; udp_repr.header_len() + MAX_PAYLOAD_LEN];
  2784. let mut packet = UdpPacket::new_unchecked(&mut bytes[..]);
  2785. udp_repr.emit(
  2786. &mut packet,
  2787. &src_addr.into(),
  2788. &dst_addr.into(),
  2789. MAX_PAYLOAD_LEN,
  2790. |buf| fill_slice(buf, 0x2a),
  2791. &ChecksumCapabilities::default(),
  2792. );
  2793. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2794. let ip_repr = Ipv4Repr {
  2795. src_addr: src_addr,
  2796. dst_addr: dst_addr,
  2797. protocol: IpProtocol::Udp,
  2798. hop_limit: 64,
  2799. payload_len: udp_repr.header_len() + MAX_PAYLOAD_LEN,
  2800. };
  2801. #[cfg(feature = "proto-ipv6")]
  2802. let ip_repr = Ipv6Repr {
  2803. src_addr: src_addr,
  2804. dst_addr: dst_addr,
  2805. next_header: IpProtocol::Udp,
  2806. hop_limit: 64,
  2807. payload_len: udp_repr.header_len() + MAX_PAYLOAD_LEN,
  2808. };
  2809. let payload = packet.into_inner();
  2810. // Expected packets
  2811. #[cfg(feature = "proto-ipv6")]
  2812. let expected_icmp_repr = Icmpv6Repr::DstUnreachable {
  2813. reason: Icmpv6DstUnreachable::PortUnreachable,
  2814. header: ip_repr,
  2815. data: &payload[..MAX_PAYLOAD_LEN],
  2816. };
  2817. #[cfg(feature = "proto-ipv6")]
  2818. let expected_ip_repr = Ipv6Repr {
  2819. src_addr: dst_addr,
  2820. dst_addr: src_addr,
  2821. next_header: IpProtocol::Icmpv6,
  2822. hop_limit: 64,
  2823. payload_len: expected_icmp_repr.buffer_len(),
  2824. };
  2825. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2826. let expected_icmp_repr = Icmpv4Repr::DstUnreachable {
  2827. reason: Icmpv4DstUnreachable::PortUnreachable,
  2828. header: ip_repr,
  2829. data: &payload[..MAX_PAYLOAD_LEN],
  2830. };
  2831. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2832. let expected_ip_repr = Ipv4Repr {
  2833. src_addr: dst_addr,
  2834. dst_addr: src_addr,
  2835. protocol: IpProtocol::Icmp,
  2836. hop_limit: 64,
  2837. payload_len: expected_icmp_repr.buffer_len(),
  2838. };
  2839. let cx = iface.context(Instant::from_secs(0));
  2840. // The expected packet does not exceed the IPV4_MIN_MTU
  2841. #[cfg(feature = "proto-ipv6")]
  2842. assert_eq!(
  2843. expected_ip_repr.buffer_len() + expected_icmp_repr.buffer_len(),
  2844. MIN_MTU
  2845. );
  2846. // The expected packet does not exceed the IPV4_MIN_MTU
  2847. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2848. assert_eq!(
  2849. expected_ip_repr.buffer_len() + expected_icmp_repr.buffer_len(),
  2850. MIN_MTU
  2851. );
  2852. // The expected packet and the generated packet are equal
  2853. #[cfg(all(feature = "proto-ipv4", not(feature = "proto-ipv6")))]
  2854. assert_eq!(
  2855. iface
  2856. .inner
  2857. .process_udp(&cx, &mut iface.sockets, ip_repr.into(), false, payload),
  2858. Ok(Some(IpPacket::Icmpv4((
  2859. expected_ip_repr,
  2860. expected_icmp_repr
  2861. ))))
  2862. );
  2863. #[cfg(feature = "proto-ipv6")]
  2864. assert_eq!(
  2865. iface
  2866. .inner
  2867. .process_udp(&cx, &mut iface.sockets, ip_repr.into(), false, payload),
  2868. Ok(Some(IpPacket::Icmpv6((
  2869. expected_ip_repr,
  2870. expected_icmp_repr
  2871. ))))
  2872. );
  2873. }
  2874. #[test]
  2875. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  2876. fn test_handle_valid_arp_request() {
  2877. let mut iface = create_loopback_ethernet();
  2878. let mut eth_bytes = vec![0u8; 42];
  2879. let local_ip_addr = Ipv4Address([0x7f, 0x00, 0x00, 0x01]);
  2880. let remote_ip_addr = Ipv4Address([0x7f, 0x00, 0x00, 0x02]);
  2881. let local_hw_addr = EthernetAddress([0x00, 0x00, 0x00, 0x00, 0x00, 0x00]);
  2882. let remote_hw_addr = EthernetAddress([0x52, 0x54, 0x00, 0x00, 0x00, 0x00]);
  2883. let repr = ArpRepr::EthernetIpv4 {
  2884. operation: ArpOperation::Request,
  2885. source_hardware_addr: remote_hw_addr,
  2886. source_protocol_addr: remote_ip_addr,
  2887. target_hardware_addr: EthernetAddress::default(),
  2888. target_protocol_addr: local_ip_addr,
  2889. };
  2890. let mut frame = EthernetFrame::new_unchecked(&mut eth_bytes);
  2891. frame.set_dst_addr(EthernetAddress::BROADCAST);
  2892. frame.set_src_addr(remote_hw_addr);
  2893. frame.set_ethertype(EthernetProtocol::Arp);
  2894. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  2895. repr.emit(&mut packet);
  2896. let cx = iface.context(Instant::from_secs(0));
  2897. // Ensure an ARP Request for us triggers an ARP Reply
  2898. assert_eq!(
  2899. iface
  2900. .inner
  2901. .process_ethernet(&cx, &mut iface.sockets, frame.into_inner()),
  2902. Ok(Some(EthernetPacket::Arp(ArpRepr::EthernetIpv4 {
  2903. operation: ArpOperation::Reply,
  2904. source_hardware_addr: local_hw_addr,
  2905. source_protocol_addr: local_ip_addr,
  2906. target_hardware_addr: remote_hw_addr,
  2907. target_protocol_addr: remote_ip_addr
  2908. })))
  2909. );
  2910. // Ensure the address of the requestor was entered in the cache
  2911. assert_eq!(
  2912. iface.inner.lookup_hardware_addr(
  2913. &cx,
  2914. MockTxToken,
  2915. &IpAddress::Ipv4(local_ip_addr),
  2916. &IpAddress::Ipv4(remote_ip_addr)
  2917. ),
  2918. Ok((HardwareAddress::Ethernet(remote_hw_addr), MockTxToken))
  2919. );
  2920. }
  2921. #[test]
  2922. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv6"))]
  2923. fn test_handle_valid_ndisc_request() {
  2924. let mut iface = create_loopback_ethernet();
  2925. let mut eth_bytes = vec![0u8; 86];
  2926. let local_ip_addr = Ipv6Address::new(0xfdbe, 0, 0, 0, 0, 0, 0, 1);
  2927. let remote_ip_addr = Ipv6Address::new(0xfdbe, 0, 0, 0, 0, 0, 0, 2);
  2928. let local_hw_addr = EthernetAddress([0x00, 0x00, 0x00, 0x00, 0x00, 0x00]);
  2929. let remote_hw_addr = EthernetAddress([0x52, 0x54, 0x00, 0x00, 0x00, 0x00]);
  2930. let solicit = Icmpv6Repr::Ndisc(NdiscRepr::NeighborSolicit {
  2931. target_addr: local_ip_addr,
  2932. lladdr: Some(remote_hw_addr.into()),
  2933. });
  2934. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  2935. src_addr: remote_ip_addr,
  2936. dst_addr: local_ip_addr.solicited_node(),
  2937. next_header: IpProtocol::Icmpv6,
  2938. hop_limit: 0xff,
  2939. payload_len: solicit.buffer_len(),
  2940. });
  2941. let mut frame = EthernetFrame::new_unchecked(&mut eth_bytes);
  2942. frame.set_dst_addr(EthernetAddress([0x33, 0x33, 0x00, 0x00, 0x00, 0x00]));
  2943. frame.set_src_addr(remote_hw_addr);
  2944. frame.set_ethertype(EthernetProtocol::Ipv6);
  2945. ip_repr.emit(frame.payload_mut(), &ChecksumCapabilities::default());
  2946. solicit.emit(
  2947. &remote_ip_addr.into(),
  2948. &local_ip_addr.solicited_node().into(),
  2949. &mut Icmpv6Packet::new_unchecked(&mut frame.payload_mut()[ip_repr.buffer_len()..]),
  2950. &ChecksumCapabilities::default(),
  2951. );
  2952. let icmpv6_expected = Icmpv6Repr::Ndisc(NdiscRepr::NeighborAdvert {
  2953. flags: NdiscNeighborFlags::SOLICITED,
  2954. target_addr: local_ip_addr,
  2955. lladdr: Some(local_hw_addr.into()),
  2956. });
  2957. let ipv6_expected = Ipv6Repr {
  2958. src_addr: local_ip_addr,
  2959. dst_addr: remote_ip_addr,
  2960. next_header: IpProtocol::Icmpv6,
  2961. hop_limit: 0xff,
  2962. payload_len: icmpv6_expected.buffer_len(),
  2963. };
  2964. let cx = iface.context(Instant::from_secs(0));
  2965. // Ensure an Neighbor Solicitation triggers a Neighbor Advertisement
  2966. assert_eq!(
  2967. iface
  2968. .inner
  2969. .process_ethernet(&cx, &mut iface.sockets, frame.into_inner()),
  2970. Ok(Some(EthernetPacket::Ip(IpPacket::Icmpv6((
  2971. ipv6_expected,
  2972. icmpv6_expected
  2973. )))))
  2974. );
  2975. // Ensure the address of the requestor was entered in the cache
  2976. assert_eq!(
  2977. iface.inner.lookup_hardware_addr(
  2978. &cx,
  2979. MockTxToken,
  2980. &IpAddress::Ipv6(local_ip_addr),
  2981. &IpAddress::Ipv6(remote_ip_addr)
  2982. ),
  2983. Ok((HardwareAddress::Ethernet(remote_hw_addr), MockTxToken))
  2984. );
  2985. }
  2986. #[test]
  2987. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  2988. fn test_handle_other_arp_request() {
  2989. let mut iface = create_loopback_ethernet();
  2990. let mut eth_bytes = vec![0u8; 42];
  2991. let remote_ip_addr = Ipv4Address([0x7f, 0x00, 0x00, 0x02]);
  2992. let remote_hw_addr = EthernetAddress([0x52, 0x54, 0x00, 0x00, 0x00, 0x00]);
  2993. let repr = ArpRepr::EthernetIpv4 {
  2994. operation: ArpOperation::Request,
  2995. source_hardware_addr: remote_hw_addr,
  2996. source_protocol_addr: remote_ip_addr,
  2997. target_hardware_addr: EthernetAddress::default(),
  2998. target_protocol_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x03]),
  2999. };
  3000. let mut frame = EthernetFrame::new_unchecked(&mut eth_bytes);
  3001. frame.set_dst_addr(EthernetAddress::BROADCAST);
  3002. frame.set_src_addr(remote_hw_addr);
  3003. frame.set_ethertype(EthernetProtocol::Arp);
  3004. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  3005. repr.emit(&mut packet);
  3006. let cx = iface.context(Instant::from_secs(0));
  3007. // Ensure an ARP Request for someone else does not trigger an ARP Reply
  3008. assert_eq!(
  3009. iface
  3010. .inner
  3011. .process_ethernet(&cx, &mut iface.sockets, frame.into_inner()),
  3012. Ok(None)
  3013. );
  3014. // Ensure the address of the requestor was NOT entered in the cache
  3015. assert_eq!(
  3016. iface.inner.lookup_hardware_addr(
  3017. &cx,
  3018. MockTxToken,
  3019. &IpAddress::Ipv4(Ipv4Address([0x7f, 0x00, 0x00, 0x01])),
  3020. &IpAddress::Ipv4(remote_ip_addr)
  3021. ),
  3022. Err(Error::Unaddressable)
  3023. );
  3024. }
  3025. #[test]
  3026. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  3027. fn test_arp_flush_after_update_ip() {
  3028. let mut iface = create_loopback_ethernet();
  3029. let mut eth_bytes = vec![0u8; 42];
  3030. let local_ip_addr = Ipv4Address([0x7f, 0x00, 0x00, 0x01]);
  3031. let remote_ip_addr = Ipv4Address([0x7f, 0x00, 0x00, 0x02]);
  3032. let local_hw_addr = EthernetAddress([0x00, 0x00, 0x00, 0x00, 0x00, 0x00]);
  3033. let remote_hw_addr = EthernetAddress([0x52, 0x54, 0x00, 0x00, 0x00, 0x00]);
  3034. let repr = ArpRepr::EthernetIpv4 {
  3035. operation: ArpOperation::Request,
  3036. source_hardware_addr: remote_hw_addr,
  3037. source_protocol_addr: remote_ip_addr,
  3038. target_hardware_addr: EthernetAddress::default(),
  3039. target_protocol_addr: Ipv4Address([0x7f, 0x00, 0x00, 0x01]),
  3040. };
  3041. let mut frame = EthernetFrame::new_unchecked(&mut eth_bytes);
  3042. frame.set_dst_addr(EthernetAddress::BROADCAST);
  3043. frame.set_src_addr(remote_hw_addr);
  3044. frame.set_ethertype(EthernetProtocol::Arp);
  3045. {
  3046. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  3047. repr.emit(&mut packet);
  3048. }
  3049. let cx = iface.context(Instant::from_secs(0));
  3050. // Ensure an ARP Request for us triggers an ARP Reply
  3051. assert_eq!(
  3052. iface
  3053. .inner
  3054. .process_ethernet(&cx, &mut iface.sockets, frame.into_inner()),
  3055. Ok(Some(EthernetPacket::Arp(ArpRepr::EthernetIpv4 {
  3056. operation: ArpOperation::Reply,
  3057. source_hardware_addr: local_hw_addr,
  3058. source_protocol_addr: local_ip_addr,
  3059. target_hardware_addr: remote_hw_addr,
  3060. target_protocol_addr: remote_ip_addr
  3061. })))
  3062. );
  3063. // Ensure the address of the requestor was entered in the cache
  3064. assert_eq!(
  3065. iface.inner.lookup_hardware_addr(
  3066. &cx,
  3067. MockTxToken,
  3068. &IpAddress::Ipv4(local_ip_addr),
  3069. &IpAddress::Ipv4(remote_ip_addr)
  3070. ),
  3071. Ok((HardwareAddress::Ethernet(remote_hw_addr), MockTxToken))
  3072. );
  3073. // Update IP addrs to trigger ARP cache flush
  3074. let local_ip_addr_new = Ipv4Address([0x7f, 0x00, 0x00, 0x01]);
  3075. iface.update_ip_addrs(|addrs| {
  3076. addrs.iter_mut().next().map(|addr| {
  3077. *addr = IpCidr::Ipv4(Ipv4Cidr::new(local_ip_addr_new, 24));
  3078. });
  3079. });
  3080. // ARP cache flush after address change
  3081. assert!(!iface
  3082. .inner
  3083. .has_neighbor(&cx, &IpAddress::Ipv4(remote_ip_addr)));
  3084. }
  3085. #[test]
  3086. #[cfg(all(feature = "socket-icmp", feature = "proto-ipv4"))]
  3087. fn test_icmpv4_socket() {
  3088. use crate::socket::{IcmpEndpoint, IcmpPacketMetadata, IcmpSocket, IcmpSocketBuffer};
  3089. use crate::wire::Icmpv4Packet;
  3090. let mut iface = create_loopback();
  3091. let rx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 24]);
  3092. let tx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 24]);
  3093. let icmpv4_socket = IcmpSocket::new(rx_buffer, tx_buffer);
  3094. let socket_handle = iface.add_socket(icmpv4_socket);
  3095. let ident = 0x1234;
  3096. let seq_no = 0x5432;
  3097. let echo_data = &[0xff; 16];
  3098. let socket = iface.get_socket::<IcmpSocket>(socket_handle);
  3099. // Bind to the ID 0x1234
  3100. assert_eq!(socket.bind(IcmpEndpoint::Ident(ident)), Ok(()));
  3101. // Ensure the ident we bound to and the ident of the packet are the same.
  3102. let mut bytes = [0xff; 24];
  3103. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  3104. let echo_repr = Icmpv4Repr::EchoRequest {
  3105. ident,
  3106. seq_no,
  3107. data: echo_data,
  3108. };
  3109. echo_repr.emit(&mut packet, &ChecksumCapabilities::default());
  3110. let icmp_data = &packet.into_inner()[..];
  3111. let ipv4_repr = Ipv4Repr {
  3112. src_addr: Ipv4Address::new(0x7f, 0x00, 0x00, 0x02),
  3113. dst_addr: Ipv4Address::new(0x7f, 0x00, 0x00, 0x01),
  3114. protocol: IpProtocol::Icmp,
  3115. payload_len: 24,
  3116. hop_limit: 64,
  3117. };
  3118. let ip_repr = IpRepr::Ipv4(ipv4_repr);
  3119. // Open a socket and ensure the packet is handled due to the listening
  3120. // socket.
  3121. assert!(!iface.get_socket::<IcmpSocket>(socket_handle).can_recv());
  3122. // Confirm we still get EchoReply from `smoltcp` even with the ICMP socket listening
  3123. let echo_reply = Icmpv4Repr::EchoReply {
  3124. ident,
  3125. seq_no,
  3126. data: echo_data,
  3127. };
  3128. let ipv4_reply = Ipv4Repr {
  3129. src_addr: ipv4_repr.dst_addr,
  3130. dst_addr: ipv4_repr.src_addr,
  3131. ..ipv4_repr
  3132. };
  3133. let cx = iface.context(Instant::from_secs(0));
  3134. assert_eq!(
  3135. iface
  3136. .inner
  3137. .process_icmpv4(&cx, &mut iface.sockets, ip_repr, icmp_data),
  3138. Ok(Some(IpPacket::Icmpv4((ipv4_reply, echo_reply))))
  3139. );
  3140. let socket = iface.get_socket::<IcmpSocket>(socket_handle);
  3141. assert!(socket.can_recv());
  3142. assert_eq!(
  3143. socket.recv(),
  3144. Ok((
  3145. icmp_data,
  3146. IpAddress::Ipv4(Ipv4Address::new(0x7f, 0x00, 0x00, 0x02))
  3147. ))
  3148. );
  3149. }
  3150. #[test]
  3151. #[cfg(feature = "proto-ipv6")]
  3152. fn test_solicited_node_addrs() {
  3153. let mut iface = create_loopback();
  3154. let mut new_addrs = vec![
  3155. IpCidr::new(IpAddress::v6(0xfe80, 0, 0, 0, 1, 2, 0, 2), 64),
  3156. IpCidr::new(IpAddress::v6(0xfe80, 0, 0, 0, 3, 4, 0, 0xffff), 64),
  3157. ];
  3158. iface.update_ip_addrs(|addrs| {
  3159. new_addrs.extend(addrs.to_vec());
  3160. *addrs = From::from(new_addrs);
  3161. });
  3162. assert!(iface
  3163. .inner
  3164. .has_solicited_node(Ipv6Address::new(0xff02, 0, 0, 0, 0, 1, 0xff00, 0x0002)));
  3165. assert!(iface
  3166. .inner
  3167. .has_solicited_node(Ipv6Address::new(0xff02, 0, 0, 0, 0, 1, 0xff00, 0xffff)));
  3168. assert!(!iface
  3169. .inner
  3170. .has_solicited_node(Ipv6Address::new(0xff02, 0, 0, 0, 0, 1, 0xff00, 0x0003)));
  3171. }
  3172. #[test]
  3173. #[cfg(feature = "proto-ipv6")]
  3174. fn test_icmpv6_nxthdr_unknown() {
  3175. let mut iface = create_loopback();
  3176. let remote_ip_addr = Ipv6Address::new(0xfe80, 0, 0, 0, 0, 0, 0, 1);
  3177. let payload = [0x12, 0x34, 0x56, 0x78];
  3178. let ipv6_repr = Ipv6Repr {
  3179. src_addr: remote_ip_addr,
  3180. dst_addr: Ipv6Address::LOOPBACK,
  3181. next_header: IpProtocol::HopByHop,
  3182. payload_len: 12,
  3183. hop_limit: 0x40,
  3184. };
  3185. let mut bytes = vec![0; 52];
  3186. let frame = {
  3187. let ip_repr = IpRepr::Ipv6(ipv6_repr);
  3188. ip_repr.emit(&mut bytes, &ChecksumCapabilities::default());
  3189. let mut offset = ipv6_repr.buffer_len();
  3190. {
  3191. let mut hbh_pkt = Ipv6HopByHopHeader::new_unchecked(&mut bytes[offset..]);
  3192. hbh_pkt.set_next_header(IpProtocol::Unknown(0x0c));
  3193. hbh_pkt.set_header_len(0);
  3194. offset += 8;
  3195. {
  3196. let mut pad_pkt = Ipv6Option::new_unchecked(&mut *hbh_pkt.options_mut());
  3197. Ipv6OptionRepr::PadN(3).emit(&mut pad_pkt);
  3198. }
  3199. {
  3200. let mut pad_pkt = Ipv6Option::new_unchecked(&mut hbh_pkt.options_mut()[5..]);
  3201. Ipv6OptionRepr::Pad1.emit(&mut pad_pkt);
  3202. }
  3203. }
  3204. bytes[offset..].copy_from_slice(&payload);
  3205. Ipv6Packet::new_unchecked(&bytes)
  3206. };
  3207. let reply_icmp_repr = Icmpv6Repr::ParamProblem {
  3208. reason: Icmpv6ParamProblem::UnrecognizedNxtHdr,
  3209. pointer: 40,
  3210. header: ipv6_repr,
  3211. data: &payload[..],
  3212. };
  3213. let reply_ipv6_repr = Ipv6Repr {
  3214. src_addr: Ipv6Address::LOOPBACK,
  3215. dst_addr: remote_ip_addr,
  3216. next_header: IpProtocol::Icmpv6,
  3217. payload_len: reply_icmp_repr.buffer_len(),
  3218. hop_limit: 0x40,
  3219. };
  3220. let cx = iface.context(Instant::from_secs(0));
  3221. // Ensure the unknown next header causes a ICMPv6 Parameter Problem
  3222. // error message to be sent to the sender.
  3223. assert_eq!(
  3224. iface.inner.process_ipv6(&cx, &mut iface.sockets, &frame),
  3225. Ok(Some(IpPacket::Icmpv6((reply_ipv6_repr, reply_icmp_repr))))
  3226. );
  3227. }
  3228. #[test]
  3229. #[cfg(feature = "proto-igmp")]
  3230. fn test_handle_igmp() {
  3231. fn recv_igmp(
  3232. mut iface: &mut Interface<'_, Loopback>,
  3233. timestamp: Instant,
  3234. ) -> Vec<(Ipv4Repr, IgmpRepr)> {
  3235. let caps = iface.device.capabilities();
  3236. let checksum_caps = &caps.checksum;
  3237. recv_all(&mut iface, timestamp)
  3238. .iter()
  3239. .filter_map(|frame| {
  3240. let ipv4_packet = match caps.medium {
  3241. #[cfg(feature = "medium-ethernet")]
  3242. Medium::Ethernet => {
  3243. let eth_frame = EthernetFrame::new_checked(frame).ok()?;
  3244. Ipv4Packet::new_checked(eth_frame.payload()).ok()?
  3245. }
  3246. #[cfg(feature = "medium-ip")]
  3247. Medium::Ip => Ipv4Packet::new_checked(&frame[..]).ok()?,
  3248. #[cfg(feature = "medium-ieee802154")]
  3249. Medium::Ieee802154 => todo!(),
  3250. };
  3251. let ipv4_repr = Ipv4Repr::parse(&ipv4_packet, checksum_caps).ok()?;
  3252. let ip_payload = ipv4_packet.payload();
  3253. let igmp_packet = IgmpPacket::new_checked(ip_payload).ok()?;
  3254. let igmp_repr = IgmpRepr::parse(&igmp_packet).ok()?;
  3255. Some((ipv4_repr, igmp_repr))
  3256. })
  3257. .collect::<Vec<_>>()
  3258. }
  3259. let groups = [
  3260. Ipv4Address::new(224, 0, 0, 22),
  3261. Ipv4Address::new(224, 0, 0, 56),
  3262. ];
  3263. let mut iface = create_loopback();
  3264. // Join multicast groups
  3265. let timestamp = Instant::now();
  3266. for group in &groups {
  3267. iface.join_multicast_group(*group, timestamp).unwrap();
  3268. }
  3269. let reports = recv_igmp(&mut iface, timestamp);
  3270. assert_eq!(reports.len(), 2);
  3271. for (i, group_addr) in groups.iter().enumerate() {
  3272. assert_eq!(reports[i].0.protocol, IpProtocol::Igmp);
  3273. assert_eq!(reports[i].0.dst_addr, *group_addr);
  3274. assert_eq!(
  3275. reports[i].1,
  3276. IgmpRepr::MembershipReport {
  3277. group_addr: *group_addr,
  3278. version: IgmpVersion::Version2,
  3279. }
  3280. );
  3281. }
  3282. // General query
  3283. let timestamp = Instant::now();
  3284. const GENERAL_QUERY_BYTES: &[u8] = &[
  3285. 0x46, 0xc0, 0x00, 0x24, 0xed, 0xb4, 0x00, 0x00, 0x01, 0x02, 0x47, 0x43, 0xac, 0x16,
  3286. 0x63, 0x04, 0xe0, 0x00, 0x00, 0x01, 0x94, 0x04, 0x00, 0x00, 0x11, 0x64, 0xec, 0x8f,
  3287. 0x00, 0x00, 0x00, 0x00, 0x02, 0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  3288. 0x00, 0x00, 0x00, 0x00,
  3289. ];
  3290. {
  3291. // Transmit GENERAL_QUERY_BYTES into loopback
  3292. let tx_token = iface.device.transmit().unwrap();
  3293. tx_token
  3294. .consume(timestamp, GENERAL_QUERY_BYTES.len(), |buffer| {
  3295. buffer.copy_from_slice(GENERAL_QUERY_BYTES);
  3296. Ok(())
  3297. })
  3298. .unwrap();
  3299. }
  3300. // Trigger processing until all packets received through the
  3301. // loopback have been processed, including responses to
  3302. // GENERAL_QUERY_BYTES. Therefore `recv_all()` would return 0
  3303. // pkts that could be checked.
  3304. let cx = iface.context(timestamp);
  3305. iface.socket_ingress(&cx);
  3306. // Leave multicast groups
  3307. let timestamp = Instant::now();
  3308. for group in &groups {
  3309. iface.leave_multicast_group(*group, timestamp).unwrap();
  3310. }
  3311. let leaves = recv_igmp(&mut iface, timestamp);
  3312. assert_eq!(leaves.len(), 2);
  3313. for (i, group_addr) in groups.iter().cloned().enumerate() {
  3314. assert_eq!(leaves[i].0.protocol, IpProtocol::Igmp);
  3315. assert_eq!(leaves[i].0.dst_addr, Ipv4Address::MULTICAST_ALL_ROUTERS);
  3316. assert_eq!(leaves[i].1, IgmpRepr::LeaveGroup { group_addr });
  3317. }
  3318. }
  3319. #[test]
  3320. #[cfg(all(feature = "proto-ipv4", feature = "socket-raw"))]
  3321. fn test_raw_socket_no_reply() {
  3322. use crate::socket::{RawPacketMetadata, RawSocket, RawSocketBuffer};
  3323. use crate::wire::{IpVersion, Ipv4Packet, UdpPacket, UdpRepr};
  3324. let mut iface = create_loopback();
  3325. let packets = 1;
  3326. let rx_buffer =
  3327. RawSocketBuffer::new(vec![RawPacketMetadata::EMPTY; packets], vec![0; 48 * 1]);
  3328. let tx_buffer = RawSocketBuffer::new(
  3329. vec![RawPacketMetadata::EMPTY; packets],
  3330. vec![0; 48 * packets],
  3331. );
  3332. let raw_socket = RawSocket::new(IpVersion::Ipv4, IpProtocol::Udp, rx_buffer, tx_buffer);
  3333. iface.add_socket(raw_socket);
  3334. let src_addr = Ipv4Address([127, 0, 0, 2]);
  3335. let dst_addr = Ipv4Address([127, 0, 0, 1]);
  3336. const PAYLOAD_LEN: usize = 10;
  3337. let udp_repr = UdpRepr {
  3338. src_port: 67,
  3339. dst_port: 68,
  3340. };
  3341. let mut bytes = vec![0xff; udp_repr.header_len() + PAYLOAD_LEN];
  3342. let mut packet = UdpPacket::new_unchecked(&mut bytes[..]);
  3343. udp_repr.emit(
  3344. &mut packet,
  3345. &src_addr.into(),
  3346. &dst_addr.into(),
  3347. PAYLOAD_LEN,
  3348. |buf| fill_slice(buf, 0x2a),
  3349. &ChecksumCapabilities::default(),
  3350. );
  3351. let ipv4_repr = Ipv4Repr {
  3352. src_addr: src_addr,
  3353. dst_addr: dst_addr,
  3354. protocol: IpProtocol::Udp,
  3355. hop_limit: 64,
  3356. payload_len: udp_repr.header_len() + PAYLOAD_LEN,
  3357. };
  3358. // Emit to frame
  3359. let mut bytes = vec![0u8; ipv4_repr.buffer_len() + udp_repr.header_len() + PAYLOAD_LEN];
  3360. let frame = {
  3361. ipv4_repr.emit(
  3362. &mut Ipv4Packet::new_unchecked(&mut bytes),
  3363. &ChecksumCapabilities::default(),
  3364. );
  3365. udp_repr.emit(
  3366. &mut UdpPacket::new_unchecked(&mut bytes[ipv4_repr.buffer_len()..]),
  3367. &src_addr.into(),
  3368. &dst_addr.into(),
  3369. PAYLOAD_LEN,
  3370. |buf| fill_slice(buf, 0x2a),
  3371. &ChecksumCapabilities::default(),
  3372. );
  3373. Ipv4Packet::new_unchecked(&bytes)
  3374. };
  3375. let cx = iface.context(Instant::from_millis(0));
  3376. assert_eq!(
  3377. iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame),
  3378. Ok(None)
  3379. );
  3380. }
  3381. #[test]
  3382. #[cfg(all(feature = "proto-ipv4", feature = "socket-raw"))]
  3383. fn test_raw_socket_truncated_packet() {
  3384. use crate::socket::{RawPacketMetadata, RawSocket, RawSocketBuffer};
  3385. use crate::wire::{IpVersion, Ipv4Packet, UdpPacket, UdpRepr};
  3386. let mut iface = create_loopback();
  3387. let packets = 1;
  3388. let rx_buffer =
  3389. RawSocketBuffer::new(vec![RawPacketMetadata::EMPTY; packets], vec![0; 48 * 1]);
  3390. let tx_buffer = RawSocketBuffer::new(
  3391. vec![RawPacketMetadata::EMPTY; packets],
  3392. vec![0; 48 * packets],
  3393. );
  3394. let raw_socket = RawSocket::new(IpVersion::Ipv4, IpProtocol::Udp, rx_buffer, tx_buffer);
  3395. iface.add_socket(raw_socket);
  3396. let src_addr = Ipv4Address([127, 0, 0, 2]);
  3397. let dst_addr = Ipv4Address([127, 0, 0, 1]);
  3398. const PAYLOAD_LEN: usize = 49; // 49 > 48, hence packet will be truncated
  3399. let udp_repr = UdpRepr {
  3400. src_port: 67,
  3401. dst_port: 68,
  3402. };
  3403. let mut bytes = vec![0xff; udp_repr.header_len() + PAYLOAD_LEN];
  3404. let mut packet = UdpPacket::new_unchecked(&mut bytes[..]);
  3405. udp_repr.emit(
  3406. &mut packet,
  3407. &src_addr.into(),
  3408. &dst_addr.into(),
  3409. PAYLOAD_LEN,
  3410. |buf| fill_slice(buf, 0x2a),
  3411. &ChecksumCapabilities::default(),
  3412. );
  3413. let ipv4_repr = Ipv4Repr {
  3414. src_addr: src_addr,
  3415. dst_addr: dst_addr,
  3416. protocol: IpProtocol::Udp,
  3417. hop_limit: 64,
  3418. payload_len: udp_repr.header_len() + PAYLOAD_LEN,
  3419. };
  3420. // Emit to frame
  3421. let mut bytes = vec![0u8; ipv4_repr.buffer_len() + udp_repr.header_len() + PAYLOAD_LEN];
  3422. let frame = {
  3423. ipv4_repr.emit(
  3424. &mut Ipv4Packet::new_unchecked(&mut bytes),
  3425. &ChecksumCapabilities::default(),
  3426. );
  3427. udp_repr.emit(
  3428. &mut UdpPacket::new_unchecked(&mut bytes[ipv4_repr.buffer_len()..]),
  3429. &src_addr.into(),
  3430. &dst_addr.into(),
  3431. PAYLOAD_LEN,
  3432. |buf| fill_slice(buf, 0x2a),
  3433. &ChecksumCapabilities::default(),
  3434. );
  3435. Ipv4Packet::new_unchecked(&bytes)
  3436. };
  3437. let cx = iface.context(Instant::from_millis(0));
  3438. let frame = iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame);
  3439. // because the packet could not be handled we should send an Icmp message
  3440. assert!(match frame {
  3441. Ok(Some(IpPacket::Icmpv4(_))) => true,
  3442. _ => false,
  3443. });
  3444. }
  3445. #[test]
  3446. #[cfg(all(feature = "proto-ipv4", feature = "socket-raw", feature = "socket-udp"))]
  3447. fn test_raw_socket_with_udp_socket() {
  3448. use crate::socket::{
  3449. RawPacketMetadata, RawSocket, RawSocketBuffer, UdpPacketMetadata, UdpSocket,
  3450. UdpSocketBuffer,
  3451. };
  3452. use crate::wire::{IpEndpoint, IpVersion, Ipv4Packet, UdpPacket, UdpRepr};
  3453. static UDP_PAYLOAD: [u8; 5] = [0x48, 0x65, 0x6c, 0x6c, 0x6f];
  3454. let mut iface = create_loopback();
  3455. let udp_rx_buffer = UdpSocketBuffer::new(vec![UdpPacketMetadata::EMPTY], vec![0; 15]);
  3456. let udp_tx_buffer = UdpSocketBuffer::new(vec![UdpPacketMetadata::EMPTY], vec![0; 15]);
  3457. let udp_socket = UdpSocket::new(udp_rx_buffer, udp_tx_buffer);
  3458. let udp_socket_handle = iface.add_socket(udp_socket);
  3459. // Bind the socket to port 68
  3460. let socket = iface.get_socket::<UdpSocket>(udp_socket_handle);
  3461. assert_eq!(socket.bind(68), Ok(()));
  3462. assert!(!socket.can_recv());
  3463. assert!(socket.can_send());
  3464. let packets = 1;
  3465. let raw_rx_buffer =
  3466. RawSocketBuffer::new(vec![RawPacketMetadata::EMPTY; packets], vec![0; 48 * 1]);
  3467. let raw_tx_buffer = RawSocketBuffer::new(
  3468. vec![RawPacketMetadata::EMPTY; packets],
  3469. vec![0; 48 * packets],
  3470. );
  3471. let raw_socket = RawSocket::new(
  3472. IpVersion::Ipv4,
  3473. IpProtocol::Udp,
  3474. raw_rx_buffer,
  3475. raw_tx_buffer,
  3476. );
  3477. iface.add_socket(raw_socket);
  3478. let src_addr = Ipv4Address([127, 0, 0, 2]);
  3479. let dst_addr = Ipv4Address([127, 0, 0, 1]);
  3480. let udp_repr = UdpRepr {
  3481. src_port: 67,
  3482. dst_port: 68,
  3483. };
  3484. let mut bytes = vec![0xff; udp_repr.header_len() + UDP_PAYLOAD.len()];
  3485. let mut packet = UdpPacket::new_unchecked(&mut bytes[..]);
  3486. udp_repr.emit(
  3487. &mut packet,
  3488. &src_addr.into(),
  3489. &dst_addr.into(),
  3490. UDP_PAYLOAD.len(),
  3491. |buf| buf.copy_from_slice(&UDP_PAYLOAD),
  3492. &ChecksumCapabilities::default(),
  3493. );
  3494. let ipv4_repr = Ipv4Repr {
  3495. src_addr: src_addr,
  3496. dst_addr: dst_addr,
  3497. protocol: IpProtocol::Udp,
  3498. hop_limit: 64,
  3499. payload_len: udp_repr.header_len() + UDP_PAYLOAD.len(),
  3500. };
  3501. // Emit to frame
  3502. let mut bytes =
  3503. vec![0u8; ipv4_repr.buffer_len() + udp_repr.header_len() + UDP_PAYLOAD.len()];
  3504. let frame = {
  3505. ipv4_repr.emit(
  3506. &mut Ipv4Packet::new_unchecked(&mut bytes),
  3507. &ChecksumCapabilities::default(),
  3508. );
  3509. udp_repr.emit(
  3510. &mut UdpPacket::new_unchecked(&mut bytes[ipv4_repr.buffer_len()..]),
  3511. &src_addr.into(),
  3512. &dst_addr.into(),
  3513. UDP_PAYLOAD.len(),
  3514. |buf| buf.copy_from_slice(&UDP_PAYLOAD),
  3515. &ChecksumCapabilities::default(),
  3516. );
  3517. Ipv4Packet::new_unchecked(&bytes)
  3518. };
  3519. let cx = iface.context(Instant::from_millis(0));
  3520. assert_eq!(
  3521. iface.inner.process_ipv4(&cx, &mut iface.sockets, &frame),
  3522. Ok(None)
  3523. );
  3524. // Make sure the UDP socket can still receive in presence of a Raw socket that handles UDP
  3525. let socket = iface.get_socket::<UdpSocket>(udp_socket_handle);
  3526. assert!(socket.can_recv());
  3527. assert_eq!(
  3528. socket.recv(),
  3529. Ok((&UDP_PAYLOAD[..], IpEndpoint::new(src_addr.into(), 67)))
  3530. );
  3531. }
  3532. }