ethernet.rs 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512
  1. use managed::{Managed, ManagedSlice};
  2. use {Error, Result};
  3. use phy::Device;
  4. use wire::{EthernetAddress, EthernetProtocol, EthernetFrame};
  5. use wire::{ArpPacket, ArpRepr, ArpOperation};
  6. use wire::{Ipv4Packet, Ipv4Repr};
  7. use wire::{Icmpv4Packet, Icmpv4Repr, Icmpv4DstUnreachable};
  8. use wire::{IpAddress, IpProtocol, IpRepr};
  9. use wire::{UdpPacket, UdpRepr, TcpPacket, TcpRepr, TcpControl};
  10. use socket::{Socket, SocketSet, RawSocket, TcpSocket, UdpSocket, AsSocket};
  11. use super::ArpCache;
  12. /// An Ethernet network interface.
  13. ///
  14. /// The network interface logically owns a number of other data structures; to avoid
  15. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  16. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  17. pub struct Interface<'a, 'b, 'c, DeviceT: Device + 'a> {
  18. device: Managed<'a, DeviceT>,
  19. arp_cache: Managed<'b, ArpCache>,
  20. hardware_addr: EthernetAddress,
  21. protocol_addrs: ManagedSlice<'c, IpAddress>,
  22. }
  23. enum Response<'a> {
  24. Nop,
  25. Arp(ArpRepr),
  26. Icmpv4(Ipv4Repr, Icmpv4Repr<'a>),
  27. Raw((IpRepr, &'a [u8])),
  28. Udp((IpRepr, UdpRepr<'a>)),
  29. Tcp((IpRepr, TcpRepr<'a>))
  30. }
  31. impl<'a, 'b, 'c, DeviceT: Device + 'a> Interface<'a, 'b, 'c, DeviceT> {
  32. /// Create a network interface using the provided network device.
  33. ///
  34. /// # Panics
  35. /// See the restrictions on [set_hardware_addr](#method.set_hardware_addr)
  36. /// and [set_protocol_addrs](#method.set_protocol_addrs) functions.
  37. pub fn new<DeviceMT, ArpCacheMT, ProtocolAddrsMT>
  38. (device: DeviceMT, arp_cache: ArpCacheMT,
  39. hardware_addr: EthernetAddress, protocol_addrs: ProtocolAddrsMT) ->
  40. Interface<'a, 'b, 'c, DeviceT>
  41. where DeviceMT: Into<Managed<'a, DeviceT>>,
  42. ArpCacheMT: Into<Managed<'b, ArpCache>>,
  43. ProtocolAddrsMT: Into<ManagedSlice<'c, IpAddress>>, {
  44. let device = device.into();
  45. let arp_cache = arp_cache.into();
  46. let protocol_addrs = protocol_addrs.into();
  47. Self::check_hardware_addr(&hardware_addr);
  48. Self::check_protocol_addrs(&protocol_addrs);
  49. Interface {
  50. device: device,
  51. arp_cache: arp_cache,
  52. hardware_addr: hardware_addr,
  53. protocol_addrs: protocol_addrs,
  54. }
  55. }
  56. fn check_hardware_addr(addr: &EthernetAddress) {
  57. if addr.is_multicast() {
  58. panic!("hardware address {} is not unicast", addr)
  59. }
  60. }
  61. /// Get the hardware address of the interface.
  62. pub fn hardware_addr(&self) -> EthernetAddress {
  63. self.hardware_addr
  64. }
  65. /// Set the hardware address of the interface.
  66. ///
  67. /// # Panics
  68. /// This function panics if the address is not unicast.
  69. pub fn set_hardware_addr(&mut self, addr: EthernetAddress) {
  70. self.hardware_addr = addr;
  71. Self::check_hardware_addr(&self.hardware_addr);
  72. }
  73. fn check_protocol_addrs(addrs: &[IpAddress]) {
  74. for addr in addrs {
  75. if !addr.is_unicast() {
  76. panic!("protocol address {} is not unicast", addr)
  77. }
  78. }
  79. }
  80. /// Get the protocol addresses of the interface.
  81. pub fn protocol_addrs(&self) -> &[IpAddress] {
  82. self.protocol_addrs.as_ref()
  83. }
  84. /// Update the protocol addresses of the interface.
  85. ///
  86. /// # Panics
  87. /// This function panics if any of the addresses is not unicast.
  88. pub fn update_protocol_addrs<F: FnOnce(&mut ManagedSlice<'c, IpAddress>)>(&mut self, f: F) {
  89. f(&mut self.protocol_addrs);
  90. Self::check_protocol_addrs(&self.protocol_addrs)
  91. }
  92. /// Check whether the interface has the given protocol address assigned.
  93. pub fn has_protocol_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  94. let addr = addr.into();
  95. self.protocol_addrs.iter().any(|&probe| probe == addr)
  96. }
  97. /// Receive and process a packet, if available, and then transmit a packet, if necessary,
  98. /// handling the given set of sockets.
  99. ///
  100. /// The timestamp is a monotonically increasing number of milliseconds.
  101. pub fn poll(&mut self, sockets: &mut SocketSet, timestamp: u64) -> Result<()> {
  102. // First, transmit any outgoing packets.
  103. loop {
  104. if self.dispatch(sockets, timestamp)? { break }
  105. }
  106. // Now, receive any incoming packets.
  107. self.process(sockets, timestamp)
  108. }
  109. fn process(&mut self, sockets: &mut SocketSet, timestamp: u64) -> Result<()> {
  110. loop {
  111. let frame = self.device.receive(timestamp)?;
  112. let response = self.process_ethernet(sockets, timestamp, &frame)?;
  113. self.dispatch_response(timestamp, response)?;
  114. }
  115. }
  116. fn process_ethernet<'frame, T: AsRef<[u8]>>
  117. (&mut self, sockets: &mut SocketSet, timestamp: u64,
  118. frame: &'frame T) ->
  119. Result<Response<'frame>> {
  120. let eth_frame = EthernetFrame::new_checked(frame)?;
  121. // Ignore any packets not directed to our hardware address.
  122. if !eth_frame.dst_addr().is_broadcast() &&
  123. eth_frame.dst_addr() != self.hardware_addr {
  124. return Ok(Response::Nop)
  125. }
  126. match eth_frame.ethertype() {
  127. EthernetProtocol::Arp =>
  128. self.process_arp(&eth_frame),
  129. EthernetProtocol::Ipv4 =>
  130. self.process_ipv4(sockets, timestamp, &eth_frame),
  131. // Drop all other traffic.
  132. _ => Err(Error::Unrecognized),
  133. }
  134. }
  135. fn process_arp<'frame, T: AsRef<[u8]>>
  136. (&mut self, eth_frame: &EthernetFrame<&'frame T>) ->
  137. Result<Response<'frame>> {
  138. let arp_packet = ArpPacket::new_checked(eth_frame.payload())?;
  139. let arp_repr = ArpRepr::parse(&arp_packet)?;
  140. match arp_repr {
  141. // Respond to ARP requests aimed at us, and fill the ARP cache from all ARP
  142. // requests and replies, to minimize the chance that we have to perform
  143. // an explicit ARP request.
  144. ArpRepr::EthernetIpv4 {
  145. operation, source_hardware_addr, source_protocol_addr, target_protocol_addr, ..
  146. } => {
  147. if source_protocol_addr.is_unicast() && source_hardware_addr.is_unicast() {
  148. self.arp_cache.fill(&source_protocol_addr.into(),
  149. &source_hardware_addr);
  150. } else {
  151. // Discard packets with non-unicast source addresses.
  152. net_debug!("non-unicast source in {}", arp_repr);
  153. return Err(Error::Malformed)
  154. }
  155. if operation == ArpOperation::Request &&
  156. self.has_protocol_addr(target_protocol_addr) {
  157. Ok(Response::Arp(ArpRepr::EthernetIpv4 {
  158. operation: ArpOperation::Reply,
  159. source_hardware_addr: self.hardware_addr,
  160. source_protocol_addr: target_protocol_addr,
  161. target_hardware_addr: source_hardware_addr,
  162. target_protocol_addr: source_protocol_addr
  163. }))
  164. } else {
  165. Ok(Response::Nop)
  166. }
  167. }
  168. _ => Err(Error::Unrecognized)
  169. }
  170. }
  171. fn process_ipv4<'frame, T: AsRef<[u8]>>
  172. (&mut self, sockets: &mut SocketSet, timestamp: u64,
  173. eth_frame: &EthernetFrame<&'frame T>) ->
  174. Result<Response<'frame>> {
  175. let ipv4_packet = Ipv4Packet::new_checked(eth_frame.payload())?;
  176. let ipv4_repr = Ipv4Repr::parse(&ipv4_packet)?;
  177. if !ipv4_repr.src_addr.is_unicast() {
  178. // Discard packets with non-unicast source addresses.
  179. net_debug!("non-unicast source in {}", ipv4_repr);
  180. return Err(Error::Malformed)
  181. }
  182. if eth_frame.src_addr().is_unicast() {
  183. // Fill the ARP cache from IP header of unicast frames.
  184. self.arp_cache.fill(&IpAddress::Ipv4(ipv4_repr.src_addr),
  185. &eth_frame.src_addr());
  186. }
  187. let ip_repr = IpRepr::Ipv4(ipv4_repr);
  188. let ip_payload = ipv4_packet.payload();
  189. // Pass every IP packet to all raw sockets we have registered.
  190. let mut handled_by_raw_socket = false;
  191. for raw_socket in sockets.iter_mut().filter_map(
  192. <Socket as AsSocket<RawSocket>>::try_as_socket) {
  193. match raw_socket.process(&ip_repr, ip_payload) {
  194. // The packet is valid and handled by socket.
  195. Ok(()) => handled_by_raw_socket = true,
  196. // The packet isn't addressed to the socket, or cannot be accepted by it.
  197. Err(Error::Rejected) | Err(Error::Exhausted) => (),
  198. // Raw sockets either accept or reject packets, not parse them.
  199. _ => unreachable!(),
  200. }
  201. }
  202. if !self.has_protocol_addr(ipv4_repr.dst_addr) {
  203. // Ignore IP packets not directed at us.
  204. return Ok(Response::Nop)
  205. }
  206. match ipv4_repr.protocol {
  207. IpProtocol::Icmp =>
  208. Self::process_icmpv4(ipv4_repr, ip_payload),
  209. IpProtocol::Udp =>
  210. Self::process_udp(sockets, ip_repr, ip_payload),
  211. IpProtocol::Tcp =>
  212. Self::process_tcp(sockets, timestamp, ip_repr, ip_payload),
  213. _ if handled_by_raw_socket =>
  214. Ok(Response::Nop),
  215. _ => {
  216. let icmp_reply_repr = Icmpv4Repr::DstUnreachable {
  217. reason: Icmpv4DstUnreachable::ProtoUnreachable,
  218. header: ipv4_repr,
  219. data: &ip_payload[0..8]
  220. };
  221. let ipv4_reply_repr = Ipv4Repr {
  222. src_addr: ipv4_repr.dst_addr,
  223. dst_addr: ipv4_repr.src_addr,
  224. protocol: IpProtocol::Icmp,
  225. payload_len: icmp_reply_repr.buffer_len()
  226. };
  227. Ok(Response::Icmpv4(ipv4_reply_repr, icmp_reply_repr))
  228. }
  229. }
  230. }
  231. fn process_icmpv4<'frame>(ipv4_repr: Ipv4Repr, ip_payload: &'frame [u8]) ->
  232. Result<Response<'frame>> {
  233. let icmp_packet = Icmpv4Packet::new_checked(ip_payload)?;
  234. let icmp_repr = Icmpv4Repr::parse(&icmp_packet)?;
  235. match icmp_repr {
  236. // Respond to echo requests.
  237. Icmpv4Repr::EchoRequest { ident, seq_no, data } => {
  238. let icmp_reply_repr = Icmpv4Repr::EchoReply {
  239. ident: ident,
  240. seq_no: seq_no,
  241. data: data
  242. };
  243. let ipv4_reply_repr = Ipv4Repr {
  244. src_addr: ipv4_repr.dst_addr,
  245. dst_addr: ipv4_repr.src_addr,
  246. protocol: IpProtocol::Icmp,
  247. payload_len: icmp_reply_repr.buffer_len()
  248. };
  249. Ok(Response::Icmpv4(ipv4_reply_repr, icmp_reply_repr))
  250. }
  251. // Ignore any echo replies.
  252. Icmpv4Repr::EchoReply { .. } => Ok(Response::Nop),
  253. // FIXME: do something correct here?
  254. _ => Err(Error::Unrecognized),
  255. }
  256. }
  257. fn process_udp<'frame>(sockets: &mut SocketSet,
  258. ip_repr: IpRepr, ip_payload: &'frame [u8]) ->
  259. Result<Response<'frame>> {
  260. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  261. let udp_packet = UdpPacket::new_checked(ip_payload)?;
  262. let udp_repr = UdpRepr::parse(&udp_packet, &src_addr, &dst_addr)?;
  263. for udp_socket in sockets.iter_mut().filter_map(
  264. <Socket as AsSocket<UdpSocket>>::try_as_socket) {
  265. match udp_socket.process(&ip_repr, &udp_repr) {
  266. // The packet is valid and handled by socket.
  267. Ok(()) => return Ok(Response::Nop),
  268. // The packet isn't addressed to the socket.
  269. Err(Error::Rejected) => continue,
  270. // The packet is malformed, or addressed to the socket but cannot be accepted.
  271. Err(e) => return Err(e)
  272. }
  273. }
  274. // The packet wasn't handled by a socket, send an ICMP port unreachable packet.
  275. match ip_repr {
  276. IpRepr::Ipv4(ipv4_repr) => {
  277. let icmpv4_reply_repr = Icmpv4Repr::DstUnreachable {
  278. reason: Icmpv4DstUnreachable::PortUnreachable,
  279. header: ipv4_repr,
  280. data: &ip_payload[0..8]
  281. };
  282. let ipv4_reply_repr = Ipv4Repr {
  283. src_addr: ipv4_repr.dst_addr,
  284. dst_addr: ipv4_repr.src_addr,
  285. protocol: IpProtocol::Icmp,
  286. payload_len: icmpv4_reply_repr.buffer_len()
  287. };
  288. Ok(Response::Icmpv4(ipv4_reply_repr, icmpv4_reply_repr))
  289. },
  290. IpRepr::Unspecified { .. } |
  291. IpRepr::__Nonexhaustive =>
  292. unreachable!()
  293. }
  294. }
  295. fn process_tcp<'frame>(sockets: &mut SocketSet, timestamp: u64,
  296. ip_repr: IpRepr, ip_payload: &'frame [u8]) ->
  297. Result<Response<'frame>> {
  298. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  299. let tcp_packet = TcpPacket::new_checked(ip_payload)?;
  300. let tcp_repr = TcpRepr::parse(&tcp_packet, &src_addr, &dst_addr)?;
  301. for tcp_socket in sockets.iter_mut().filter_map(
  302. <Socket as AsSocket<TcpSocket>>::try_as_socket) {
  303. match tcp_socket.process(timestamp, &ip_repr, &tcp_repr) {
  304. // The packet is valid and handled by socket.
  305. Ok(reply) => return Ok(reply.map_or(Response::Nop, Response::Tcp)),
  306. // The packet isn't addressed to the socket.
  307. // Send RST only if no other socket accepts the packet.
  308. Err(Error::Rejected) => continue,
  309. // The packet is malformed, or addressed to the socket but cannot be accepted.
  310. Err(e) => return Err(e)
  311. }
  312. }
  313. if tcp_repr.control == TcpControl::Rst {
  314. // Never reply to a TCP RST packet with another TCP RST packet.
  315. Ok(Response::Nop)
  316. } else {
  317. // The packet wasn't handled by a socket, send a TCP RST packet.
  318. Ok(Response::Tcp(TcpSocket::rst_reply(&ip_repr, &tcp_repr)))
  319. }
  320. }
  321. fn dispatch(&mut self, sockets: &mut SocketSet, timestamp: u64) -> Result<bool> {
  322. let mut limits = self.device.limits();
  323. limits.max_transmission_unit -= EthernetFrame::<&[u8]>::header_len();
  324. let mut nothing_to_transmit = true;
  325. for socket in sockets.iter_mut() {
  326. let result = match socket {
  327. &mut Socket::Raw(ref mut socket) =>
  328. socket.dispatch(|response|
  329. self.dispatch_response(timestamp, Response::Raw(response))),
  330. &mut Socket::Udp(ref mut socket) =>
  331. socket.dispatch(|response|
  332. self.dispatch_response(timestamp, Response::Udp(response))),
  333. &mut Socket::Tcp(ref mut socket) =>
  334. socket.dispatch(timestamp, &limits, |response|
  335. self.dispatch_response(timestamp, Response::Tcp(response))),
  336. &mut Socket::__Nonexhaustive => unreachable!()
  337. };
  338. match result {
  339. Ok(()) => {
  340. nothing_to_transmit = false;
  341. break
  342. }
  343. Err(Error::Exhausted) => continue,
  344. Err(e) => return Err(e)
  345. }
  346. }
  347. Ok(nothing_to_transmit)
  348. }
  349. fn dispatch_response(&mut self, timestamp: u64, response: Response) -> Result<()> {
  350. match response {
  351. Response::Arp(arp_repr) => {
  352. let dst_hardware_addr =
  353. match arp_repr {
  354. ArpRepr::EthernetIpv4 { target_hardware_addr, .. } => target_hardware_addr,
  355. _ => unreachable!()
  356. };
  357. self.dispatch_ethernet(timestamp, arp_repr.buffer_len(), |mut frame| {
  358. frame.set_dst_addr(dst_hardware_addr);
  359. frame.set_ethertype(EthernetProtocol::Arp);
  360. let mut packet = ArpPacket::new(frame.payload_mut());
  361. arp_repr.emit(&mut packet);
  362. })
  363. },
  364. Response::Icmpv4(ipv4_repr, icmpv4_repr) => {
  365. self.dispatch_ip(timestamp, IpRepr::Ipv4(ipv4_repr), |_ip_repr, payload| {
  366. icmpv4_repr.emit(&mut Icmpv4Packet::new(payload));
  367. })
  368. }
  369. Response::Raw((ip_repr, raw_packet)) => {
  370. self.dispatch_ip(timestamp, ip_repr, |_ip_repr, payload| {
  371. payload.copy_from_slice(raw_packet);
  372. })
  373. }
  374. Response::Udp((ip_repr, udp_repr)) => {
  375. self.dispatch_ip(timestamp, ip_repr, |ip_repr, payload| {
  376. udp_repr.emit(&mut UdpPacket::new(payload),
  377. &ip_repr.src_addr(), &ip_repr.dst_addr());
  378. })
  379. }
  380. Response::Tcp((ip_repr, tcp_repr)) => {
  381. self.dispatch_ip(timestamp, ip_repr, |ip_repr, payload| {
  382. tcp_repr.emit(&mut TcpPacket::new(payload),
  383. &ip_repr.src_addr(), &ip_repr.dst_addr());
  384. })
  385. }
  386. Response::Nop => Ok(())
  387. }
  388. }
  389. fn dispatch_ethernet<F>(&mut self, timestamp: u64, buffer_len: usize, f: F) -> Result<()>
  390. where F: FnOnce(EthernetFrame<&mut [u8]>) {
  391. let tx_len = EthernetFrame::<&[u8]>::buffer_len(buffer_len);
  392. let mut tx_buffer = self.device.transmit(timestamp, tx_len)?;
  393. debug_assert!(tx_buffer.as_ref().len() == tx_len);
  394. let mut frame = EthernetFrame::new(tx_buffer.as_mut());
  395. frame.set_src_addr(self.hardware_addr);
  396. f(frame);
  397. Ok(())
  398. }
  399. fn lookup_hardware_addr(&mut self, timestamp: u64,
  400. src_addr: &IpAddress, dst_addr: &IpAddress) ->
  401. Result<EthernetAddress> {
  402. if let Some(hardware_addr) = self.arp_cache.lookup(dst_addr) {
  403. return Ok(hardware_addr)
  404. }
  405. if dst_addr.is_broadcast() {
  406. return Ok(EthernetAddress([0xff; 6]))
  407. }
  408. match (src_addr, dst_addr) {
  409. (&IpAddress::Ipv4(src_addr), &IpAddress::Ipv4(dst_addr)) => {
  410. net_debug!("address {} not in ARP cache, sending request",
  411. dst_addr);
  412. let arp_repr = ArpRepr::EthernetIpv4 {
  413. operation: ArpOperation::Request,
  414. source_hardware_addr: self.hardware_addr,
  415. source_protocol_addr: src_addr,
  416. target_hardware_addr: EthernetAddress([0xff; 6]),
  417. target_protocol_addr: dst_addr,
  418. };
  419. self.dispatch_ethernet(timestamp, arp_repr.buffer_len(), |mut frame| {
  420. frame.set_dst_addr(EthernetAddress([0xff; 6]));
  421. frame.set_ethertype(EthernetProtocol::Arp);
  422. arp_repr.emit(&mut ArpPacket::new(frame.payload_mut()))
  423. })?;
  424. Err(Error::Unaddressable)
  425. }
  426. _ => unreachable!()
  427. }
  428. }
  429. fn dispatch_ip<F>(&mut self, timestamp: u64, ip_repr: IpRepr, f: F) -> Result<()>
  430. where F: FnOnce(IpRepr, &mut [u8]) {
  431. let ip_repr = ip_repr.lower(&self.protocol_addrs)?;
  432. // FIXME: use plain try! here once we don't have the horrible nothing_to_transmit hack.
  433. let dst_hardware_addr =
  434. self.lookup_hardware_addr(timestamp, &ip_repr.src_addr(), &ip_repr.dst_addr());
  435. if let Err(Error::Unaddressable) = dst_hardware_addr {
  436. return Ok(())
  437. }
  438. let dst_hardware_addr = dst_hardware_addr?;
  439. self.dispatch_ethernet(timestamp, ip_repr.total_len(), |mut frame| {
  440. frame.set_dst_addr(dst_hardware_addr);
  441. match ip_repr {
  442. IpRepr::Ipv4(_) => frame.set_ethertype(EthernetProtocol::Ipv4),
  443. _ => unreachable!()
  444. }
  445. ip_repr.emit(frame.payload_mut());
  446. let payload = &mut frame.payload_mut()[ip_repr.buffer_len()..];
  447. f(ip_repr, payload)
  448. })
  449. }
  450. }