mod.rs 60 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650
  1. // Heads up! Before working on this file you should read the parts
  2. // of RFC 1122 that discuss Ethernet, ARP and IP for any IPv4 work
  3. // and RFCs 8200 and 4861 for any IPv6 and NDISC work.
  4. #[cfg(test)]
  5. mod tests;
  6. #[cfg(feature = "medium-ethernet")]
  7. mod ethernet;
  8. #[cfg(feature = "medium-ieee802154")]
  9. mod ieee802154;
  10. #[cfg(feature = "proto-ipv4")]
  11. mod ipv4;
  12. #[cfg(feature = "proto-ipv6")]
  13. mod ipv6;
  14. #[cfg(feature = "proto-sixlowpan")]
  15. mod sixlowpan;
  16. #[cfg(feature = "proto-igmp")]
  17. mod igmp;
  18. #[cfg(feature = "proto-igmp")]
  19. pub use igmp::MulticastError;
  20. use super::packet::*;
  21. use core::result::Result;
  22. use heapless::{LinearMap, Vec};
  23. #[cfg(feature = "_proto-fragmentation")]
  24. use super::fragmentation::FragKey;
  25. #[cfg(any(feature = "proto-ipv4", feature = "proto-sixlowpan"))]
  26. use super::fragmentation::PacketAssemblerSet;
  27. use super::fragmentation::{Fragmenter, FragmentsBuffer};
  28. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  29. use super::neighbor::{Answer as NeighborAnswer, Cache as NeighborCache};
  30. use super::socket_set::SocketSet;
  31. use crate::config::{
  32. IFACE_MAX_ADDR_COUNT, IFACE_MAX_MULTICAST_GROUP_COUNT,
  33. IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT,
  34. };
  35. use crate::iface::Routes;
  36. use crate::phy::PacketMeta;
  37. use crate::phy::{ChecksumCapabilities, Device, DeviceCapabilities, Medium, RxToken, TxToken};
  38. use crate::rand::Rand;
  39. #[cfg(feature = "socket-dns")]
  40. use crate::socket::dns;
  41. use crate::socket::*;
  42. use crate::time::{Duration, Instant};
  43. use crate::wire::*;
  44. macro_rules! check {
  45. ($e:expr) => {
  46. match $e {
  47. Ok(x) => x,
  48. Err(_) => {
  49. // concat!/stringify! doesn't work with defmt macros
  50. #[cfg(not(feature = "defmt"))]
  51. net_trace!(concat!("iface: malformed ", stringify!($e)));
  52. #[cfg(feature = "defmt")]
  53. net_trace!("iface: malformed");
  54. return Default::default();
  55. }
  56. }
  57. };
  58. }
  59. use check;
  60. /// A network interface.
  61. ///
  62. /// The network interface logically owns a number of other data structures; to avoid
  63. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  64. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  65. pub struct Interface {
  66. pub(crate) inner: InterfaceInner,
  67. fragments: FragmentsBuffer,
  68. fragmenter: Fragmenter,
  69. }
  70. /// The device independent part of an Ethernet network interface.
  71. ///
  72. /// Separating the device from the data required for processing and dispatching makes
  73. /// it possible to borrow them independently. For example, the tx and rx tokens borrow
  74. /// the `device` mutably until they're used, which makes it impossible to call other
  75. /// methods on the `Interface` in this time (since its `device` field is borrowed
  76. /// exclusively). However, it is still possible to call methods on its `inner` field.
  77. pub struct InterfaceInner {
  78. caps: DeviceCapabilities,
  79. now: Instant,
  80. rand: Rand,
  81. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  82. neighbor_cache: NeighborCache,
  83. hardware_addr: HardwareAddress,
  84. #[cfg(feature = "medium-ieee802154")]
  85. sequence_no: u8,
  86. #[cfg(feature = "medium-ieee802154")]
  87. pan_id: Option<Ieee802154Pan>,
  88. #[cfg(feature = "proto-ipv4-fragmentation")]
  89. ipv4_id: u16,
  90. #[cfg(feature = "proto-sixlowpan")]
  91. sixlowpan_address_context:
  92. Vec<SixlowpanAddressContext, IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT>,
  93. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  94. tag: u16,
  95. ip_addrs: Vec<IpCidr, IFACE_MAX_ADDR_COUNT>,
  96. #[cfg(feature = "proto-ipv4")]
  97. any_ip: bool,
  98. routes: Routes,
  99. #[cfg(feature = "proto-igmp")]
  100. ipv4_multicast_groups: LinearMap<Ipv4Address, (), IFACE_MAX_MULTICAST_GROUP_COUNT>,
  101. /// When to report for (all or) the next multicast group membership via IGMP
  102. #[cfg(feature = "proto-igmp")]
  103. igmp_report_state: IgmpReportState,
  104. }
  105. /// Configuration structure used for creating a network interface.
  106. #[non_exhaustive]
  107. pub struct Config {
  108. /// Random seed.
  109. ///
  110. /// It is strongly recommended that the random seed is different on each boot,
  111. /// to avoid problems with TCP port/sequence collisions.
  112. ///
  113. /// The seed doesn't have to be cryptographically secure.
  114. pub random_seed: u64,
  115. /// Set the Hardware address the interface will use.
  116. ///
  117. /// # Panics
  118. /// Creating the interface panics if the address is not unicast.
  119. pub hardware_addr: HardwareAddress,
  120. /// Set the IEEE802.15.4 PAN ID the interface will use.
  121. ///
  122. /// **NOTE**: we use the same PAN ID for destination and source.
  123. #[cfg(feature = "medium-ieee802154")]
  124. pub pan_id: Option<Ieee802154Pan>,
  125. }
  126. impl Config {
  127. pub fn new(hardware_addr: HardwareAddress) -> Self {
  128. Config {
  129. random_seed: 0,
  130. hardware_addr,
  131. #[cfg(feature = "medium-ieee802154")]
  132. pan_id: None,
  133. }
  134. }
  135. }
  136. impl Interface {
  137. /// Create a network interface using the previously provided configuration.
  138. ///
  139. /// # Panics
  140. /// This function panics if the [`Config::hardware_address`] does not match
  141. /// the medium of the device.
  142. pub fn new<D>(config: Config, device: &mut D, now: Instant) -> Self
  143. where
  144. D: Device + ?Sized,
  145. {
  146. let caps = device.capabilities();
  147. assert_eq!(
  148. config.hardware_addr.medium(),
  149. caps.medium,
  150. "The hardware address does not match the medium of the interface."
  151. );
  152. let mut rand = Rand::new(config.random_seed);
  153. #[cfg(feature = "medium-ieee802154")]
  154. let mut sequence_no;
  155. #[cfg(feature = "medium-ieee802154")]
  156. loop {
  157. sequence_no = (rand.rand_u32() & 0xff) as u8;
  158. if sequence_no != 0 {
  159. break;
  160. }
  161. }
  162. #[cfg(feature = "proto-sixlowpan")]
  163. let mut tag;
  164. #[cfg(feature = "proto-sixlowpan")]
  165. loop {
  166. tag = rand.rand_u16();
  167. if tag != 0 {
  168. break;
  169. }
  170. }
  171. #[cfg(feature = "proto-ipv4")]
  172. let mut ipv4_id;
  173. #[cfg(feature = "proto-ipv4")]
  174. loop {
  175. ipv4_id = rand.rand_u16();
  176. if ipv4_id != 0 {
  177. break;
  178. }
  179. }
  180. Interface {
  181. fragments: FragmentsBuffer {
  182. #[cfg(feature = "proto-sixlowpan")]
  183. decompress_buf: [0u8; sixlowpan::MAX_DECOMPRESSED_LEN],
  184. #[cfg(feature = "_proto-fragmentation")]
  185. assembler: PacketAssemblerSet::new(),
  186. #[cfg(feature = "_proto-fragmentation")]
  187. reassembly_timeout: Duration::from_secs(60),
  188. },
  189. fragmenter: Fragmenter::new(),
  190. inner: InterfaceInner {
  191. now,
  192. caps,
  193. hardware_addr: config.hardware_addr,
  194. ip_addrs: Vec::new(),
  195. #[cfg(feature = "proto-ipv4")]
  196. any_ip: false,
  197. routes: Routes::new(),
  198. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  199. neighbor_cache: NeighborCache::new(),
  200. #[cfg(feature = "proto-igmp")]
  201. ipv4_multicast_groups: LinearMap::new(),
  202. #[cfg(feature = "proto-igmp")]
  203. igmp_report_state: IgmpReportState::Inactive,
  204. #[cfg(feature = "medium-ieee802154")]
  205. sequence_no,
  206. #[cfg(feature = "medium-ieee802154")]
  207. pan_id: config.pan_id,
  208. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  209. tag,
  210. #[cfg(feature = "proto-ipv4-fragmentation")]
  211. ipv4_id,
  212. #[cfg(feature = "proto-sixlowpan")]
  213. sixlowpan_address_context: Vec::new(),
  214. rand,
  215. },
  216. }
  217. }
  218. /// Get the socket context.
  219. ///
  220. /// The context is needed for some socket methods.
  221. pub fn context(&mut self) -> &mut InterfaceInner {
  222. &mut self.inner
  223. }
  224. /// Get the HardwareAddress address of the interface.
  225. ///
  226. /// # Panics
  227. /// This function panics if the medium is not Ethernet or Ieee802154.
  228. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  229. pub fn hardware_addr(&self) -> HardwareAddress {
  230. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  231. assert!(self.inner.caps.medium == Medium::Ethernet);
  232. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  233. assert!(self.inner.caps.medium == Medium::Ieee802154);
  234. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  235. assert!(
  236. self.inner.caps.medium == Medium::Ethernet
  237. || self.inner.caps.medium == Medium::Ieee802154
  238. );
  239. self.inner.hardware_addr
  240. }
  241. /// Set the HardwareAddress address of the interface.
  242. ///
  243. /// # Panics
  244. /// This function panics if the address is not unicast, and if the medium is not Ethernet or
  245. /// Ieee802154.
  246. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  247. pub fn set_hardware_addr(&mut self, addr: HardwareAddress) {
  248. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  249. assert!(self.inner.caps.medium == Medium::Ethernet);
  250. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  251. assert!(self.inner.caps.medium == Medium::Ieee802154);
  252. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  253. assert!(
  254. self.inner.caps.medium == Medium::Ethernet
  255. || self.inner.caps.medium == Medium::Ieee802154
  256. );
  257. InterfaceInner::check_hardware_addr(&addr);
  258. self.inner.hardware_addr = addr;
  259. }
  260. /// Get the IP addresses of the interface.
  261. pub fn ip_addrs(&self) -> &[IpCidr] {
  262. self.inner.ip_addrs.as_ref()
  263. }
  264. /// Get the first IPv4 address if present.
  265. #[cfg(feature = "proto-ipv4")]
  266. pub fn ipv4_addr(&self) -> Option<Ipv4Address> {
  267. self.inner.ipv4_addr()
  268. }
  269. /// Get the first IPv6 address if present.
  270. #[cfg(feature = "proto-ipv6")]
  271. pub fn ipv6_addr(&self) -> Option<Ipv6Address> {
  272. self.inner.ipv6_addr()
  273. }
  274. /// Get an address from the interface that could be used as source address. For IPv4, this is
  275. /// the first IPv4 address from the list of addresses. For IPv6, the address is based on the
  276. /// destination address and uses RFC6724 for selecting the source address.
  277. pub fn get_source_address(&self, dst_addr: &IpAddress) -> Option<IpAddress> {
  278. self.inner.get_source_address(dst_addr)
  279. }
  280. /// Get an address from the interface that could be used as source address. This is the first
  281. /// IPv4 address from the list of addresses in the interface.
  282. #[cfg(feature = "proto-ipv4")]
  283. pub fn get_source_address_ipv4(&self, dst_addr: &Ipv4Address) -> Option<Ipv4Address> {
  284. self.inner.get_source_address_ipv4(dst_addr)
  285. }
  286. /// Get an address from the interface that could be used as source address. The selection is
  287. /// based on RFC6724.
  288. #[cfg(feature = "proto-ipv6")]
  289. pub fn get_source_address_ipv6(&self, dst_addr: &Ipv6Address) -> Option<Ipv6Address> {
  290. self.inner.get_source_address_ipv6(dst_addr)
  291. }
  292. /// Update the IP addresses of the interface.
  293. ///
  294. /// # Panics
  295. /// This function panics if any of the addresses are not unicast.
  296. pub fn update_ip_addrs<F: FnOnce(&mut Vec<IpCidr, IFACE_MAX_ADDR_COUNT>)>(&mut self, f: F) {
  297. f(&mut self.inner.ip_addrs);
  298. InterfaceInner::flush_cache(&mut self.inner);
  299. InterfaceInner::check_ip_addrs(&self.inner.ip_addrs)
  300. }
  301. /// Check whether the interface has the given IP address assigned.
  302. pub fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  303. self.inner.has_ip_addr(addr)
  304. }
  305. pub fn routes(&self) -> &Routes {
  306. &self.inner.routes
  307. }
  308. pub fn routes_mut(&mut self) -> &mut Routes {
  309. &mut self.inner.routes
  310. }
  311. /// Enable or disable the AnyIP capability.
  312. ///
  313. /// AnyIP allowins packets to be received
  314. /// locally on IPv4 addresses other than the interface's configured [ip_addrs].
  315. /// When AnyIP is enabled and a route prefix in [`routes`](Self::routes) specifies one of
  316. /// the interface's [`ip_addrs`](Self::ip_addrs) as its gateway, the interface will accept
  317. /// packets addressed to that prefix.
  318. ///
  319. /// # IPv6
  320. ///
  321. /// This option is not available or required for IPv6 as packets sent to
  322. /// the interface are not filtered by IPv6 address.
  323. #[cfg(feature = "proto-ipv4")]
  324. pub fn set_any_ip(&mut self, any_ip: bool) {
  325. self.inner.any_ip = any_ip;
  326. }
  327. /// Get whether AnyIP is enabled.
  328. ///
  329. /// See [`set_any_ip`](Self::set_any_ip) for details on AnyIP
  330. #[cfg(feature = "proto-ipv4")]
  331. pub fn any_ip(&self) -> bool {
  332. self.inner.any_ip
  333. }
  334. /// Get the 6LoWPAN address contexts.
  335. #[cfg(feature = "proto-sixlowpan")]
  336. pub fn sixlowpan_address_context(
  337. &self,
  338. ) -> &Vec<SixlowpanAddressContext, IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT> {
  339. &self.inner.sixlowpan_address_context
  340. }
  341. /// Get a mutable reference to the 6LoWPAN address contexts.
  342. #[cfg(feature = "proto-sixlowpan")]
  343. pub fn sixlowpan_address_context_mut(
  344. &mut self,
  345. ) -> &mut Vec<SixlowpanAddressContext, IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT> {
  346. &mut self.inner.sixlowpan_address_context
  347. }
  348. /// Get the packet reassembly timeout.
  349. #[cfg(feature = "_proto-fragmentation")]
  350. pub fn reassembly_timeout(&self) -> Duration {
  351. self.fragments.reassembly_timeout
  352. }
  353. /// Set the packet reassembly timeout.
  354. #[cfg(feature = "_proto-fragmentation")]
  355. pub fn set_reassembly_timeout(&mut self, timeout: Duration) {
  356. if timeout > Duration::from_secs(60) {
  357. net_debug!("RFC 4944 specifies that the reassembly timeout MUST be set to a maximum of 60 seconds");
  358. }
  359. self.fragments.reassembly_timeout = timeout;
  360. }
  361. /// Transmit packets queued in the given sockets, and receive packets queued
  362. /// in the device.
  363. ///
  364. /// This function returns a boolean value indicating whether any packets were
  365. /// processed or emitted, and thus, whether the readiness of any socket might
  366. /// have changed.
  367. pub fn poll<D>(
  368. &mut self,
  369. timestamp: Instant,
  370. device: &mut D,
  371. sockets: &mut SocketSet<'_>,
  372. ) -> bool
  373. where
  374. D: Device + ?Sized,
  375. {
  376. self.inner.now = timestamp;
  377. #[cfg(feature = "_proto-fragmentation")]
  378. self.fragments.assembler.remove_expired(timestamp);
  379. match self.inner.caps.medium {
  380. #[cfg(feature = "medium-ieee802154")]
  381. Medium::Ieee802154 =>
  382. {
  383. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  384. if self.sixlowpan_egress(device) {
  385. return true;
  386. }
  387. }
  388. #[cfg(any(feature = "medium-ethernet", feature = "medium-ip"))]
  389. _ =>
  390. {
  391. #[cfg(feature = "proto-ipv4-fragmentation")]
  392. if self.ipv4_egress(device) {
  393. return true;
  394. }
  395. }
  396. }
  397. let mut readiness_may_have_changed = false;
  398. loop {
  399. let mut did_something = false;
  400. did_something |= self.socket_ingress(device, sockets);
  401. did_something |= self.socket_egress(device, sockets);
  402. #[cfg(feature = "proto-igmp")]
  403. {
  404. did_something |= self.igmp_egress(device);
  405. }
  406. if did_something {
  407. readiness_may_have_changed = true;
  408. } else {
  409. break;
  410. }
  411. }
  412. readiness_may_have_changed
  413. }
  414. /// Return a _soft deadline_ for calling [poll] the next time.
  415. /// The [Instant] returned is the time at which you should call [poll] next.
  416. /// It is harmless (but wastes energy) to call it before the [Instant], and
  417. /// potentially harmful (impacting quality of service) to call it after the
  418. /// [Instant]
  419. ///
  420. /// [poll]: #method.poll
  421. /// [Instant]: struct.Instant.html
  422. pub fn poll_at(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Instant> {
  423. self.inner.now = timestamp;
  424. #[cfg(feature = "_proto-fragmentation")]
  425. if !self.fragmenter.is_empty() {
  426. return Some(Instant::from_millis(0));
  427. }
  428. let inner = &mut self.inner;
  429. sockets
  430. .items()
  431. .filter_map(move |item| {
  432. let socket_poll_at = item.socket.poll_at(inner);
  433. match item
  434. .meta
  435. .poll_at(socket_poll_at, |ip_addr| inner.has_neighbor(&ip_addr))
  436. {
  437. PollAt::Ingress => None,
  438. PollAt::Time(instant) => Some(instant),
  439. PollAt::Now => Some(Instant::from_millis(0)),
  440. }
  441. })
  442. .min()
  443. }
  444. /// Return an _advisory wait time_ for calling [poll] the next time.
  445. /// The [Duration] returned is the time left to wait before calling [poll] next.
  446. /// It is harmless (but wastes energy) to call it before the [Duration] has passed,
  447. /// and potentially harmful (impacting quality of service) to call it after the
  448. /// [Duration] has passed.
  449. ///
  450. /// [poll]: #method.poll
  451. /// [Duration]: struct.Duration.html
  452. pub fn poll_delay(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Duration> {
  453. match self.poll_at(timestamp, sockets) {
  454. Some(poll_at) if timestamp < poll_at => Some(poll_at - timestamp),
  455. Some(_) => Some(Duration::from_millis(0)),
  456. _ => None,
  457. }
  458. }
  459. fn socket_ingress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  460. where
  461. D: Device + ?Sized,
  462. {
  463. let mut processed_any = false;
  464. while let Some((rx_token, tx_token)) = device.receive(self.inner.now) {
  465. let rx_meta = rx_token.meta();
  466. rx_token.consume(|frame| {
  467. if frame.is_empty() {
  468. return;
  469. }
  470. match self.inner.caps.medium {
  471. #[cfg(feature = "medium-ethernet")]
  472. Medium::Ethernet => {
  473. if let Some(packet) = self.inner.process_ethernet(
  474. sockets,
  475. rx_meta,
  476. frame,
  477. &mut self.fragments,
  478. ) {
  479. if let Err(err) =
  480. self.inner.dispatch(tx_token, packet, &mut self.fragmenter)
  481. {
  482. net_debug!("Failed to send response: {:?}", err);
  483. }
  484. }
  485. }
  486. #[cfg(feature = "medium-ip")]
  487. Medium::Ip => {
  488. if let Some(packet) =
  489. self.inner
  490. .process_ip(sockets, rx_meta, frame, &mut self.fragments)
  491. {
  492. if let Err(err) = self.inner.dispatch_ip(
  493. tx_token,
  494. PacketMeta::default(),
  495. packet,
  496. &mut self.fragmenter,
  497. ) {
  498. net_debug!("Failed to send response: {:?}", err);
  499. }
  500. }
  501. }
  502. #[cfg(feature = "medium-ieee802154")]
  503. Medium::Ieee802154 => {
  504. if let Some(packet) = self.inner.process_ieee802154(
  505. sockets,
  506. rx_meta,
  507. frame,
  508. &mut self.fragments,
  509. ) {
  510. if let Err(err) = self.inner.dispatch_ip(
  511. tx_token,
  512. PacketMeta::default(),
  513. packet,
  514. &mut self.fragmenter,
  515. ) {
  516. net_debug!("Failed to send response: {:?}", err);
  517. }
  518. }
  519. }
  520. }
  521. processed_any = true;
  522. });
  523. }
  524. processed_any
  525. }
  526. fn socket_egress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  527. where
  528. D: Device + ?Sized,
  529. {
  530. let _caps = device.capabilities();
  531. enum EgressError {
  532. Exhausted,
  533. Dispatch(DispatchError),
  534. }
  535. let mut emitted_any = false;
  536. for item in sockets.items_mut() {
  537. if !item
  538. .meta
  539. .egress_permitted(self.inner.now, |ip_addr| self.inner.has_neighbor(&ip_addr))
  540. {
  541. continue;
  542. }
  543. let mut neighbor_addr = None;
  544. let mut respond = |inner: &mut InterfaceInner, meta: PacketMeta, response: Packet| {
  545. neighbor_addr = Some(response.ip_repr().dst_addr());
  546. let t = device.transmit(inner.now).ok_or_else(|| {
  547. net_debug!("failed to transmit IP: device exhausted");
  548. EgressError::Exhausted
  549. })?;
  550. inner
  551. .dispatch_ip(t, meta, response, &mut self.fragmenter)
  552. .map_err(EgressError::Dispatch)?;
  553. emitted_any = true;
  554. Ok(())
  555. };
  556. let result = match &mut item.socket {
  557. #[cfg(feature = "socket-raw")]
  558. Socket::Raw(socket) => socket.dispatch(&mut self.inner, |inner, (ip, raw)| {
  559. respond(
  560. inner,
  561. PacketMeta::default(),
  562. Packet::new(ip, IpPayload::Raw(raw)),
  563. )
  564. }),
  565. #[cfg(feature = "socket-icmp")]
  566. Socket::Icmp(socket) => {
  567. socket.dispatch(&mut self.inner, |inner, response| match response {
  568. #[cfg(feature = "proto-ipv4")]
  569. (IpRepr::Ipv4(ipv4_repr), IcmpRepr::Ipv4(icmpv4_repr)) => respond(
  570. inner,
  571. PacketMeta::default(),
  572. Packet::new_ipv4(ipv4_repr, IpPayload::Icmpv4(icmpv4_repr)),
  573. ),
  574. #[cfg(feature = "proto-ipv6")]
  575. (IpRepr::Ipv6(ipv6_repr), IcmpRepr::Ipv6(icmpv6_repr)) => respond(
  576. inner,
  577. PacketMeta::default(),
  578. Packet::new_ipv6(ipv6_repr, IpPayload::Icmpv6(icmpv6_repr)),
  579. ),
  580. #[allow(unreachable_patterns)]
  581. _ => unreachable!(),
  582. })
  583. }
  584. #[cfg(feature = "socket-udp")]
  585. Socket::Udp(socket) => {
  586. socket.dispatch(&mut self.inner, |inner, meta, (ip, udp, payload)| {
  587. respond(inner, meta, Packet::new(ip, IpPayload::Udp(udp, payload)))
  588. })
  589. }
  590. #[cfg(feature = "socket-tcp")]
  591. Socket::Tcp(socket) => socket.dispatch(&mut self.inner, |inner, (ip, tcp)| {
  592. respond(
  593. inner,
  594. PacketMeta::default(),
  595. Packet::new(ip, IpPayload::Tcp(tcp)),
  596. )
  597. }),
  598. #[cfg(feature = "socket-dhcpv4")]
  599. Socket::Dhcpv4(socket) => {
  600. socket.dispatch(&mut self.inner, |inner, (ip, udp, dhcp)| {
  601. respond(
  602. inner,
  603. PacketMeta::default(),
  604. Packet::new_ipv4(ip, IpPayload::Dhcpv4(udp, dhcp)),
  605. )
  606. })
  607. }
  608. #[cfg(feature = "socket-dns")]
  609. Socket::Dns(socket) => socket.dispatch(&mut self.inner, |inner, (ip, udp, dns)| {
  610. respond(
  611. inner,
  612. PacketMeta::default(),
  613. Packet::new(ip, IpPayload::Udp(udp, dns)),
  614. )
  615. }),
  616. };
  617. match result {
  618. Err(EgressError::Exhausted) => break, // Device buffer full.
  619. Err(EgressError::Dispatch(_)) => {
  620. // `NeighborCache` already takes care of rate limiting the neighbor discovery
  621. // requests from the socket. However, without an additional rate limiting
  622. // mechanism, we would spin on every socket that has yet to discover its
  623. // neighbor.
  624. item.meta.neighbor_missing(
  625. self.inner.now,
  626. neighbor_addr.expect("non-IP response packet"),
  627. );
  628. }
  629. Ok(()) => {}
  630. }
  631. }
  632. emitted_any
  633. }
  634. /// Process fragments that still need to be sent for IPv4 packets.
  635. ///
  636. /// This function returns a boolean value indicating whether any packets were
  637. /// processed or emitted, and thus, whether the readiness of any socket might
  638. /// have changed.
  639. #[cfg(feature = "proto-ipv4-fragmentation")]
  640. fn ipv4_egress<D>(&mut self, device: &mut D) -> bool
  641. where
  642. D: Device + ?Sized,
  643. {
  644. // Reset the buffer when we transmitted everything.
  645. if self.fragmenter.finished() {
  646. self.fragmenter.reset();
  647. }
  648. if self.fragmenter.is_empty() {
  649. return false;
  650. }
  651. let pkt = &self.fragmenter;
  652. if pkt.packet_len > pkt.sent_bytes {
  653. if let Some(tx_token) = device.transmit(self.inner.now) {
  654. self.inner
  655. .dispatch_ipv4_frag(tx_token, &mut self.fragmenter);
  656. return true;
  657. }
  658. }
  659. false
  660. }
  661. /// Process fragments that still need to be sent for 6LoWPAN packets.
  662. ///
  663. /// This function returns a boolean value indicating whether any packets were
  664. /// processed or emitted, and thus, whether the readiness of any socket might
  665. /// have changed.
  666. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  667. fn sixlowpan_egress<D>(&mut self, device: &mut D) -> bool
  668. where
  669. D: Device + ?Sized,
  670. {
  671. // Reset the buffer when we transmitted everything.
  672. if self.fragmenter.finished() {
  673. self.fragmenter.reset();
  674. }
  675. if self.fragmenter.is_empty() {
  676. return false;
  677. }
  678. let pkt = &self.fragmenter;
  679. if pkt.packet_len > pkt.sent_bytes {
  680. if let Some(tx_token) = device.transmit(self.inner.now) {
  681. self.inner
  682. .dispatch_ieee802154_frag(tx_token, &mut self.fragmenter);
  683. return true;
  684. }
  685. }
  686. false
  687. }
  688. }
  689. impl InterfaceInner {
  690. #[allow(unused)] // unused depending on which sockets are enabled
  691. pub(crate) fn now(&self) -> Instant {
  692. self.now
  693. }
  694. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  695. #[allow(unused)] // unused depending on which sockets are enabled
  696. pub(crate) fn hardware_addr(&self) -> HardwareAddress {
  697. self.hardware_addr
  698. }
  699. #[allow(unused)] // unused depending on which sockets are enabled
  700. pub(crate) fn checksum_caps(&self) -> ChecksumCapabilities {
  701. self.caps.checksum.clone()
  702. }
  703. #[allow(unused)] // unused depending on which sockets are enabled
  704. pub(crate) fn ip_mtu(&self) -> usize {
  705. self.caps.ip_mtu()
  706. }
  707. #[allow(unused)] // unused depending on which sockets are enabled, and in tests
  708. pub(crate) fn rand(&mut self) -> &mut Rand {
  709. &mut self.rand
  710. }
  711. #[allow(unused)] // unused depending on which sockets are enabled
  712. pub(crate) fn get_source_address(&self, dst_addr: &IpAddress) -> Option<IpAddress> {
  713. match dst_addr {
  714. #[cfg(feature = "proto-ipv4")]
  715. IpAddress::Ipv4(addr) => self.get_source_address_ipv4(addr).map(|a| a.into()),
  716. #[cfg(feature = "proto-ipv6")]
  717. IpAddress::Ipv6(addr) => self.get_source_address_ipv6(addr).map(|a| a.into()),
  718. }
  719. }
  720. #[cfg(feature = "proto-ipv4")]
  721. #[allow(unused)]
  722. pub(crate) fn get_source_address_ipv4(&self, _dst_addr: &Ipv4Address) -> Option<Ipv4Address> {
  723. for cidr in self.ip_addrs.iter() {
  724. #[allow(irrefutable_let_patterns)] // if only ipv4 is enabled
  725. if let IpCidr::Ipv4(cidr) = cidr {
  726. return Some(cidr.address());
  727. }
  728. }
  729. None
  730. }
  731. #[cfg(feature = "proto-ipv6")]
  732. #[allow(unused)]
  733. pub(crate) fn get_source_address_ipv6(&self, dst_addr: &Ipv6Address) -> Option<Ipv6Address> {
  734. // RFC 6724 describes how to select the correct source address depending on the destination
  735. // address.
  736. // See RFC 6724 Section 4: Candidate source address
  737. fn is_candidate_source_address(dst_addr: &Ipv6Address, src_addr: &Ipv6Address) -> bool {
  738. // For all multicast and link-local destination addresses, the candidate address MUST
  739. // only be an address from the same link.
  740. if dst_addr.is_link_local() && !src_addr.is_link_local() {
  741. return false;
  742. }
  743. if dst_addr.is_multicast()
  744. && matches!(dst_addr.scope(), Ipv6AddressScope::LinkLocal)
  745. && src_addr.is_multicast()
  746. && !matches!(src_addr.scope(), Ipv6AddressScope::LinkLocal)
  747. {
  748. return false;
  749. }
  750. // Loopback addresses and multicast address can not be in the candidate source address
  751. // list. Except when the destination multicast address has a link-local scope, then the
  752. // source address can also be link-local multicast.
  753. if src_addr.is_loopback() || src_addr.is_multicast() {
  754. return false;
  755. }
  756. true
  757. }
  758. // See RFC 6724 Section 2.2: Common Prefix Length
  759. fn common_prefix_length(dst_addr: &Ipv6Cidr, src_addr: &Ipv6Address) -> usize {
  760. let addr = dst_addr.address();
  761. let mut bits = 0;
  762. for (l, r) in addr.as_bytes().iter().zip(src_addr.as_bytes().iter()) {
  763. if l == r {
  764. bits += 8;
  765. } else {
  766. bits += (l ^ r).leading_zeros();
  767. break;
  768. }
  769. }
  770. bits = bits.min(dst_addr.prefix_len() as u32);
  771. bits as usize
  772. }
  773. // Get the first address that is a candidate address.
  774. let mut candidate = self
  775. .ip_addrs
  776. .iter()
  777. .filter_map(|a| match a {
  778. #[cfg(feature = "proto-ipv4")]
  779. IpCidr::Ipv4(_) => None,
  780. #[cfg(feature = "proto-ipv6")]
  781. IpCidr::Ipv6(a) => Some(a),
  782. })
  783. .find(|a| is_candidate_source_address(dst_addr, &a.address()))
  784. .unwrap();
  785. for addr in self.ip_addrs.iter().filter_map(|a| match a {
  786. #[cfg(feature = "proto-ipv4")]
  787. IpCidr::Ipv4(_) => None,
  788. #[cfg(feature = "proto-ipv6")]
  789. IpCidr::Ipv6(a) => Some(a),
  790. }) {
  791. if !is_candidate_source_address(dst_addr, &addr.address()) {
  792. continue;
  793. }
  794. // Rule 1: prefer the address that is the same as the output destination address.
  795. if candidate.address() != *dst_addr && addr.address() == *dst_addr {
  796. candidate = addr;
  797. }
  798. // Rule 2: prefer appropriate scope.
  799. if (candidate.address().scope() as u8) < (addr.address().scope() as u8) {
  800. if (candidate.address().scope() as u8) < (dst_addr.scope() as u8) {
  801. candidate = addr;
  802. }
  803. } else if (addr.address().scope() as u8) > (dst_addr.scope() as u8) {
  804. candidate = addr;
  805. }
  806. // Rule 3: avoid deprecated addresses (TODO)
  807. // Rule 4: prefer home addresses (TODO)
  808. // Rule 5: prefer outgoing interfaces (TODO)
  809. // Rule 5.5: prefer addresses in a prefix advertises by the next-hop (TODO).
  810. // Rule 6: prefer matching label (TODO)
  811. // Rule 7: prefer temporary addresses (TODO)
  812. // Rule 8: use longest matching prefix
  813. if common_prefix_length(candidate, dst_addr) < common_prefix_length(addr, dst_addr) {
  814. candidate = addr;
  815. }
  816. }
  817. Some(candidate.address())
  818. }
  819. #[cfg(test)]
  820. #[allow(unused)] // unused depending on which sockets are enabled
  821. pub(crate) fn set_now(&mut self, now: Instant) {
  822. self.now = now
  823. }
  824. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  825. fn check_hardware_addr(addr: &HardwareAddress) {
  826. if !addr.is_unicast() {
  827. panic!("Hardware address {addr} is not unicast")
  828. }
  829. }
  830. fn check_ip_addrs(addrs: &[IpCidr]) {
  831. for cidr in addrs {
  832. if !cidr.address().is_unicast() && !cidr.address().is_unspecified() {
  833. panic!("IP address {} is not unicast", cidr.address())
  834. }
  835. }
  836. }
  837. #[cfg(feature = "medium-ieee802154")]
  838. fn get_sequence_number(&mut self) -> u8 {
  839. let no = self.sequence_no;
  840. self.sequence_no = self.sequence_no.wrapping_add(1);
  841. no
  842. }
  843. #[cfg(feature = "proto-ipv4-fragmentation")]
  844. fn get_ipv4_ident(&mut self) -> u16 {
  845. let ipv4_id = self.ipv4_id;
  846. self.ipv4_id = self.ipv4_id.wrapping_add(1);
  847. ipv4_id
  848. }
  849. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  850. fn get_sixlowpan_fragment_tag(&mut self) -> u16 {
  851. let tag = self.tag;
  852. self.tag = self.tag.wrapping_add(1);
  853. tag
  854. }
  855. /// Determine if the given `Ipv6Address` is the solicited node
  856. /// multicast address for a IPv6 addresses assigned to the interface.
  857. /// See [RFC 4291 § 2.7.1] for more details.
  858. ///
  859. /// [RFC 4291 § 2.7.1]: https://tools.ietf.org/html/rfc4291#section-2.7.1
  860. #[cfg(feature = "proto-ipv6")]
  861. pub fn has_solicited_node(&self, addr: Ipv6Address) -> bool {
  862. self.ip_addrs.iter().any(|cidr| {
  863. match *cidr {
  864. IpCidr::Ipv6(cidr) if cidr.address() != Ipv6Address::LOOPBACK => {
  865. // Take the lower order 24 bits of the IPv6 address and
  866. // append those bits to FF02:0:0:0:0:1:FF00::/104.
  867. addr.as_bytes()[14..] == cidr.address().as_bytes()[14..]
  868. }
  869. _ => false,
  870. }
  871. })
  872. }
  873. /// Check whether the interface has the given IP address assigned.
  874. fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  875. let addr = addr.into();
  876. self.ip_addrs.iter().any(|probe| probe.address() == addr)
  877. }
  878. /// Get the first IPv4 address of the interface.
  879. #[cfg(feature = "proto-ipv4")]
  880. pub fn ipv4_addr(&self) -> Option<Ipv4Address> {
  881. self.ip_addrs.iter().find_map(|addr| match *addr {
  882. IpCidr::Ipv4(cidr) => Some(cidr.address()),
  883. #[allow(unreachable_patterns)]
  884. _ => None,
  885. })
  886. }
  887. /// Get the first IPv6 address if present.
  888. #[cfg(feature = "proto-ipv6")]
  889. pub fn ipv6_addr(&self) -> Option<Ipv6Address> {
  890. self.ip_addrs.iter().find_map(|addr| match *addr {
  891. IpCidr::Ipv6(cidr) => Some(cidr.address()),
  892. #[allow(unreachable_patterns)]
  893. _ => None,
  894. })
  895. }
  896. /// Check whether the interface listens to given destination multicast IP address.
  897. ///
  898. /// If built without feature `proto-igmp` this function will
  899. /// always return `false` when using IPv4.
  900. fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  901. match addr.into() {
  902. #[cfg(feature = "proto-igmp")]
  903. IpAddress::Ipv4(key) => {
  904. key == Ipv4Address::MULTICAST_ALL_SYSTEMS
  905. || self.ipv4_multicast_groups.get(&key).is_some()
  906. }
  907. #[cfg(feature = "proto-ipv6")]
  908. IpAddress::Ipv6(Ipv6Address::LINK_LOCAL_ALL_NODES) => true,
  909. #[cfg(feature = "proto-rpl")]
  910. IpAddress::Ipv6(Ipv6Address::LINK_LOCAL_ALL_RPL_NODES) => true,
  911. #[cfg(feature = "proto-ipv6")]
  912. IpAddress::Ipv6(addr) => self.has_solicited_node(addr),
  913. #[allow(unreachable_patterns)]
  914. _ => false,
  915. }
  916. }
  917. #[cfg(feature = "medium-ip")]
  918. fn process_ip<'frame>(
  919. &mut self,
  920. sockets: &mut SocketSet,
  921. meta: PacketMeta,
  922. ip_payload: &'frame [u8],
  923. frag: &'frame mut FragmentsBuffer,
  924. ) -> Option<Packet<'frame>> {
  925. match IpVersion::of_packet(ip_payload) {
  926. #[cfg(feature = "proto-ipv4")]
  927. Ok(IpVersion::Ipv4) => {
  928. let ipv4_packet = check!(Ipv4Packet::new_checked(ip_payload));
  929. self.process_ipv4(sockets, meta, &ipv4_packet, frag)
  930. }
  931. #[cfg(feature = "proto-ipv6")]
  932. Ok(IpVersion::Ipv6) => {
  933. let ipv6_packet = check!(Ipv6Packet::new_checked(ip_payload));
  934. self.process_ipv6(sockets, meta, &ipv6_packet)
  935. }
  936. // Drop all other traffic.
  937. _ => None,
  938. }
  939. }
  940. #[cfg(feature = "socket-raw")]
  941. fn raw_socket_filter(
  942. &mut self,
  943. sockets: &mut SocketSet,
  944. ip_repr: &IpRepr,
  945. ip_payload: &[u8],
  946. ) -> bool {
  947. let mut handled_by_raw_socket = false;
  948. // Pass every IP packet to all raw sockets we have registered.
  949. for raw_socket in sockets
  950. .items_mut()
  951. .filter_map(|i| raw::Socket::downcast_mut(&mut i.socket))
  952. {
  953. if raw_socket.accepts(ip_repr) {
  954. raw_socket.process(self, ip_repr, ip_payload);
  955. handled_by_raw_socket = true;
  956. }
  957. }
  958. handled_by_raw_socket
  959. }
  960. /// Checks if an address is broadcast, taking into account ipv4 subnet-local
  961. /// broadcast addresses.
  962. pub(crate) fn is_broadcast(&self, address: &IpAddress) -> bool {
  963. match address {
  964. #[cfg(feature = "proto-ipv4")]
  965. IpAddress::Ipv4(address) => self.is_broadcast_v4(*address),
  966. #[cfg(feature = "proto-ipv6")]
  967. IpAddress::Ipv6(_) => false,
  968. }
  969. }
  970. /// Checks if an address is broadcast, taking into account ipv4 subnet-local
  971. /// broadcast addresses.
  972. #[cfg(feature = "proto-ipv4")]
  973. pub(crate) fn is_broadcast_v4(&self, address: Ipv4Address) -> bool {
  974. if address.is_broadcast() {
  975. return true;
  976. }
  977. self.ip_addrs
  978. .iter()
  979. .filter_map(|own_cidr| match own_cidr {
  980. IpCidr::Ipv4(own_ip) => Some(own_ip.broadcast()?),
  981. #[cfg(feature = "proto-ipv6")]
  982. IpCidr::Ipv6(_) => None,
  983. })
  984. .any(|broadcast_address| address == broadcast_address)
  985. }
  986. /// Checks if an ipv4 address is unicast, taking into account subnet broadcast addresses
  987. #[cfg(feature = "proto-ipv4")]
  988. fn is_unicast_v4(&self, address: Ipv4Address) -> bool {
  989. address.is_unicast() && !self.is_broadcast_v4(address)
  990. }
  991. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  992. fn process_udp<'frame>(
  993. &mut self,
  994. sockets: &mut SocketSet,
  995. meta: PacketMeta,
  996. handled_by_raw_socket: bool,
  997. ip_repr: IpRepr,
  998. ip_payload: &'frame [u8],
  999. ) -> Option<Packet<'frame>> {
  1000. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1001. let udp_packet = check!(UdpPacket::new_checked(ip_payload));
  1002. let udp_repr = check!(UdpRepr::parse(
  1003. &udp_packet,
  1004. &src_addr,
  1005. &dst_addr,
  1006. &self.caps.checksum
  1007. ));
  1008. #[cfg(feature = "socket-udp")]
  1009. for udp_socket in sockets
  1010. .items_mut()
  1011. .filter_map(|i| udp::Socket::downcast_mut(&mut i.socket))
  1012. {
  1013. if udp_socket.accepts(self, &ip_repr, &udp_repr) {
  1014. udp_socket.process(self, meta, &ip_repr, &udp_repr, udp_packet.payload());
  1015. return None;
  1016. }
  1017. }
  1018. #[cfg(feature = "socket-dns")]
  1019. for dns_socket in sockets
  1020. .items_mut()
  1021. .filter_map(|i| dns::Socket::downcast_mut(&mut i.socket))
  1022. {
  1023. if dns_socket.accepts(&ip_repr, &udp_repr) {
  1024. dns_socket.process(self, &ip_repr, &udp_repr, udp_packet.payload());
  1025. return None;
  1026. }
  1027. }
  1028. // The packet wasn't handled by a socket, send an ICMP port unreachable packet.
  1029. match ip_repr {
  1030. #[cfg(feature = "proto-ipv4")]
  1031. IpRepr::Ipv4(_) if handled_by_raw_socket => None,
  1032. #[cfg(feature = "proto-ipv6")]
  1033. IpRepr::Ipv6(_) if handled_by_raw_socket => None,
  1034. #[cfg(feature = "proto-ipv4")]
  1035. IpRepr::Ipv4(ipv4_repr) => {
  1036. let payload_len =
  1037. icmp_reply_payload_len(ip_payload.len(), IPV4_MIN_MTU, ipv4_repr.buffer_len());
  1038. let icmpv4_reply_repr = Icmpv4Repr::DstUnreachable {
  1039. reason: Icmpv4DstUnreachable::PortUnreachable,
  1040. header: ipv4_repr,
  1041. data: &ip_payload[0..payload_len],
  1042. };
  1043. self.icmpv4_reply(ipv4_repr, icmpv4_reply_repr)
  1044. }
  1045. #[cfg(feature = "proto-ipv6")]
  1046. IpRepr::Ipv6(ipv6_repr) => {
  1047. let payload_len =
  1048. icmp_reply_payload_len(ip_payload.len(), IPV6_MIN_MTU, ipv6_repr.buffer_len());
  1049. let icmpv6_reply_repr = Icmpv6Repr::DstUnreachable {
  1050. reason: Icmpv6DstUnreachable::PortUnreachable,
  1051. header: ipv6_repr,
  1052. data: &ip_payload[0..payload_len],
  1053. };
  1054. self.icmpv6_reply(ipv6_repr, icmpv6_reply_repr)
  1055. }
  1056. }
  1057. }
  1058. #[cfg(feature = "socket-tcp")]
  1059. pub(crate) fn process_tcp<'frame>(
  1060. &mut self,
  1061. sockets: &mut SocketSet,
  1062. ip_repr: IpRepr,
  1063. ip_payload: &'frame [u8],
  1064. ) -> Option<Packet<'frame>> {
  1065. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1066. let tcp_packet = check!(TcpPacket::new_checked(ip_payload));
  1067. let tcp_repr = check!(TcpRepr::parse(
  1068. &tcp_packet,
  1069. &src_addr,
  1070. &dst_addr,
  1071. &self.caps.checksum
  1072. ));
  1073. for tcp_socket in sockets
  1074. .items_mut()
  1075. .filter_map(|i| tcp::Socket::downcast_mut(&mut i.socket))
  1076. {
  1077. if tcp_socket.accepts(self, &ip_repr, &tcp_repr) {
  1078. return tcp_socket
  1079. .process(self, &ip_repr, &tcp_repr)
  1080. .map(|(ip, tcp)| Packet::new(ip, IpPayload::Tcp(tcp)));
  1081. }
  1082. }
  1083. if tcp_repr.control == TcpControl::Rst
  1084. || ip_repr.dst_addr().is_unspecified()
  1085. || ip_repr.src_addr().is_unspecified()
  1086. {
  1087. // Never reply to a TCP RST packet with another TCP RST packet. We also never want to
  1088. // send a TCP RST packet with unspecified addresses.
  1089. None
  1090. } else {
  1091. // The packet wasn't handled by a socket, send a TCP RST packet.
  1092. let (ip, tcp) = tcp::Socket::rst_reply(&ip_repr, &tcp_repr);
  1093. Some(Packet::new(ip, IpPayload::Tcp(tcp)))
  1094. }
  1095. }
  1096. #[cfg(feature = "medium-ethernet")]
  1097. fn dispatch<Tx>(
  1098. &mut self,
  1099. tx_token: Tx,
  1100. packet: EthernetPacket,
  1101. frag: &mut Fragmenter,
  1102. ) -> Result<(), DispatchError>
  1103. where
  1104. Tx: TxToken,
  1105. {
  1106. match packet {
  1107. #[cfg(feature = "proto-ipv4")]
  1108. EthernetPacket::Arp(arp_repr) => {
  1109. let dst_hardware_addr = match arp_repr {
  1110. ArpRepr::EthernetIpv4 {
  1111. target_hardware_addr,
  1112. ..
  1113. } => target_hardware_addr,
  1114. };
  1115. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  1116. frame.set_dst_addr(dst_hardware_addr);
  1117. frame.set_ethertype(EthernetProtocol::Arp);
  1118. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  1119. arp_repr.emit(&mut packet);
  1120. })
  1121. }
  1122. EthernetPacket::Ip(packet) => {
  1123. self.dispatch_ip(tx_token, PacketMeta::default(), packet, frag)
  1124. }
  1125. }
  1126. }
  1127. fn in_same_network(&self, addr: &IpAddress) -> bool {
  1128. self.ip_addrs.iter().any(|cidr| cidr.contains_addr(addr))
  1129. }
  1130. fn route(&self, addr: &IpAddress, timestamp: Instant) -> Option<IpAddress> {
  1131. // Send directly.
  1132. // note: no need to use `self.is_broadcast()` to check for subnet-local broadcast addrs
  1133. // here because `in_same_network` will already return true.
  1134. if self.in_same_network(addr) || addr.is_broadcast() {
  1135. return Some(*addr);
  1136. }
  1137. // Route via a router.
  1138. self.routes.lookup(addr, timestamp)
  1139. }
  1140. fn has_neighbor(&self, addr: &IpAddress) -> bool {
  1141. match self.route(addr, self.now) {
  1142. Some(_routed_addr) => match self.caps.medium {
  1143. #[cfg(feature = "medium-ethernet")]
  1144. Medium::Ethernet => self.neighbor_cache.lookup(&_routed_addr, self.now).found(),
  1145. #[cfg(feature = "medium-ieee802154")]
  1146. Medium::Ieee802154 => self.neighbor_cache.lookup(&_routed_addr, self.now).found(),
  1147. #[cfg(feature = "medium-ip")]
  1148. Medium::Ip => true,
  1149. },
  1150. None => false,
  1151. }
  1152. }
  1153. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1154. fn lookup_hardware_addr<Tx>(
  1155. &mut self,
  1156. tx_token: Tx,
  1157. src_addr: &IpAddress,
  1158. dst_addr: &IpAddress,
  1159. fragmenter: &mut Fragmenter,
  1160. ) -> Result<(HardwareAddress, Tx), DispatchError>
  1161. where
  1162. Tx: TxToken,
  1163. {
  1164. if self.is_broadcast(dst_addr) {
  1165. let hardware_addr = match self.caps.medium {
  1166. #[cfg(feature = "medium-ethernet")]
  1167. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::BROADCAST),
  1168. #[cfg(feature = "medium-ieee802154")]
  1169. Medium::Ieee802154 => HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST),
  1170. #[cfg(feature = "medium-ip")]
  1171. Medium::Ip => unreachable!(),
  1172. };
  1173. return Ok((hardware_addr, tx_token));
  1174. }
  1175. if dst_addr.is_multicast() {
  1176. let b = dst_addr.as_bytes();
  1177. let hardware_addr = match *dst_addr {
  1178. #[cfg(feature = "proto-ipv4")]
  1179. IpAddress::Ipv4(_addr) => match self.caps.medium {
  1180. #[cfg(feature = "medium-ethernet")]
  1181. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1182. 0x01,
  1183. 0x00,
  1184. 0x5e,
  1185. b[1] & 0x7F,
  1186. b[2],
  1187. b[3],
  1188. ])),
  1189. #[cfg(feature = "medium-ieee802154")]
  1190. Medium::Ieee802154 => unreachable!(),
  1191. #[cfg(feature = "medium-ip")]
  1192. Medium::Ip => unreachable!(),
  1193. },
  1194. #[cfg(feature = "proto-ipv6")]
  1195. IpAddress::Ipv6(_addr) => match self.caps.medium {
  1196. #[cfg(feature = "medium-ethernet")]
  1197. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1198. 0x33, 0x33, b[12], b[13], b[14], b[15],
  1199. ])),
  1200. #[cfg(feature = "medium-ieee802154")]
  1201. Medium::Ieee802154 => {
  1202. // Not sure if this is correct
  1203. HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST)
  1204. }
  1205. #[cfg(feature = "medium-ip")]
  1206. Medium::Ip => unreachable!(),
  1207. },
  1208. };
  1209. return Ok((hardware_addr, tx_token));
  1210. }
  1211. let dst_addr = self
  1212. .route(dst_addr, self.now)
  1213. .ok_or(DispatchError::NoRoute)?;
  1214. match self.neighbor_cache.lookup(&dst_addr, self.now) {
  1215. NeighborAnswer::Found(hardware_addr) => return Ok((hardware_addr, tx_token)),
  1216. NeighborAnswer::RateLimited => return Err(DispatchError::NeighborPending),
  1217. _ => (), // XXX
  1218. }
  1219. match (src_addr, dst_addr) {
  1220. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  1221. (&IpAddress::Ipv4(src_addr), IpAddress::Ipv4(dst_addr))
  1222. if matches!(self.caps.medium, Medium::Ethernet) =>
  1223. {
  1224. net_debug!(
  1225. "address {} not in neighbor cache, sending ARP request",
  1226. dst_addr
  1227. );
  1228. let src_hardware_addr = self.hardware_addr.ethernet_or_panic();
  1229. let arp_repr = ArpRepr::EthernetIpv4 {
  1230. operation: ArpOperation::Request,
  1231. source_hardware_addr: src_hardware_addr,
  1232. source_protocol_addr: src_addr,
  1233. target_hardware_addr: EthernetAddress::BROADCAST,
  1234. target_protocol_addr: dst_addr,
  1235. };
  1236. if let Err(e) =
  1237. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  1238. frame.set_dst_addr(EthernetAddress::BROADCAST);
  1239. frame.set_ethertype(EthernetProtocol::Arp);
  1240. arp_repr.emit(&mut ArpPacket::new_unchecked(frame.payload_mut()))
  1241. })
  1242. {
  1243. net_debug!("Failed to dispatch ARP request: {:?}", e);
  1244. return Err(DispatchError::NeighborPending);
  1245. }
  1246. }
  1247. #[cfg(feature = "proto-ipv6")]
  1248. (&IpAddress::Ipv6(src_addr), IpAddress::Ipv6(dst_addr)) => {
  1249. net_debug!(
  1250. "address {} not in neighbor cache, sending Neighbor Solicitation",
  1251. dst_addr
  1252. );
  1253. let solicit = Icmpv6Repr::Ndisc(NdiscRepr::NeighborSolicit {
  1254. target_addr: dst_addr,
  1255. lladdr: Some(self.hardware_addr.into()),
  1256. });
  1257. let packet = Packet::new_ipv6(
  1258. Ipv6Repr {
  1259. src_addr,
  1260. dst_addr: dst_addr.solicited_node(),
  1261. next_header: IpProtocol::Icmpv6,
  1262. payload_len: solicit.buffer_len(),
  1263. hop_limit: 0xff,
  1264. },
  1265. IpPayload::Icmpv6(solicit),
  1266. );
  1267. if let Err(e) =
  1268. self.dispatch_ip(tx_token, PacketMeta::default(), packet, fragmenter)
  1269. {
  1270. net_debug!("Failed to dispatch NDISC solicit: {:?}", e);
  1271. return Err(DispatchError::NeighborPending);
  1272. }
  1273. }
  1274. #[allow(unreachable_patterns)]
  1275. _ => (),
  1276. }
  1277. // The request got dispatched, limit the rate on the cache.
  1278. self.neighbor_cache.limit_rate(self.now);
  1279. Err(DispatchError::NeighborPending)
  1280. }
  1281. fn flush_cache(&mut self) {
  1282. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1283. self.neighbor_cache.flush()
  1284. }
  1285. fn dispatch_ip<Tx: TxToken>(
  1286. &mut self,
  1287. // NOTE(unused_mut): tx_token isn't always mutated, depending on
  1288. // the feature set that is used.
  1289. #[allow(unused_mut)] mut tx_token: Tx,
  1290. meta: PacketMeta,
  1291. packet: Packet,
  1292. frag: &mut Fragmenter,
  1293. ) -> Result<(), DispatchError> {
  1294. let mut ip_repr = packet.ip_repr();
  1295. assert!(!ip_repr.dst_addr().is_unspecified());
  1296. // Dispatch IEEE802.15.4:
  1297. #[cfg(feature = "medium-ieee802154")]
  1298. if matches!(self.caps.medium, Medium::Ieee802154) {
  1299. let (addr, tx_token) = self.lookup_hardware_addr(
  1300. tx_token,
  1301. &ip_repr.src_addr(),
  1302. &ip_repr.dst_addr(),
  1303. frag,
  1304. )?;
  1305. let addr = addr.ieee802154_or_panic();
  1306. self.dispatch_ieee802154(addr, tx_token, meta, packet, frag);
  1307. return Ok(());
  1308. }
  1309. // Dispatch IP/Ethernet:
  1310. let caps = self.caps.clone();
  1311. #[cfg(feature = "proto-ipv4-fragmentation")]
  1312. let ipv4_id = self.get_ipv4_ident();
  1313. // First we calculate the total length that we will have to emit.
  1314. let mut total_len = ip_repr.buffer_len();
  1315. // Add the size of the Ethernet header if the medium is Ethernet.
  1316. #[cfg(feature = "medium-ethernet")]
  1317. if matches!(self.caps.medium, Medium::Ethernet) {
  1318. total_len = EthernetFrame::<&[u8]>::buffer_len(total_len);
  1319. }
  1320. // If the medium is Ethernet, then we need to retrieve the destination hardware address.
  1321. #[cfg(feature = "medium-ethernet")]
  1322. let (dst_hardware_addr, mut tx_token) = match self.caps.medium {
  1323. Medium::Ethernet => {
  1324. match self.lookup_hardware_addr(
  1325. tx_token,
  1326. &ip_repr.src_addr(),
  1327. &ip_repr.dst_addr(),
  1328. frag,
  1329. )? {
  1330. (HardwareAddress::Ethernet(addr), tx_token) => (addr, tx_token),
  1331. (_, _) => unreachable!(),
  1332. }
  1333. }
  1334. _ => (EthernetAddress([0; 6]), tx_token),
  1335. };
  1336. // Emit function for the Ethernet header.
  1337. #[cfg(feature = "medium-ethernet")]
  1338. let emit_ethernet = |repr: &IpRepr, tx_buffer: &mut [u8]| {
  1339. let mut frame = EthernetFrame::new_unchecked(tx_buffer);
  1340. let src_addr = self.hardware_addr.ethernet_or_panic();
  1341. frame.set_src_addr(src_addr);
  1342. frame.set_dst_addr(dst_hardware_addr);
  1343. match repr.version() {
  1344. #[cfg(feature = "proto-ipv4")]
  1345. IpVersion::Ipv4 => frame.set_ethertype(EthernetProtocol::Ipv4),
  1346. #[cfg(feature = "proto-ipv6")]
  1347. IpVersion::Ipv6 => frame.set_ethertype(EthernetProtocol::Ipv6),
  1348. }
  1349. Ok(())
  1350. };
  1351. // Emit function for the IP header and payload.
  1352. let emit_ip = |repr: &IpRepr, mut tx_buffer: &mut [u8]| {
  1353. repr.emit(&mut tx_buffer, &self.caps.checksum);
  1354. let payload = &mut tx_buffer[repr.header_len()..];
  1355. packet.emit_payload(repr, payload, &caps)
  1356. };
  1357. let total_ip_len = ip_repr.buffer_len();
  1358. match &mut ip_repr {
  1359. #[cfg(feature = "proto-ipv4")]
  1360. IpRepr::Ipv4(repr) => {
  1361. // If we have an IPv4 packet, then we need to check if we need to fragment it.
  1362. if total_ip_len > self.caps.max_transmission_unit {
  1363. #[cfg(feature = "proto-ipv4-fragmentation")]
  1364. {
  1365. net_debug!("start fragmentation");
  1366. // Calculate how much we will send now (including the Ethernet header).
  1367. let tx_len = self.caps.max_transmission_unit;
  1368. let ip_header_len = repr.buffer_len();
  1369. let first_frag_ip_len = self.caps.ip_mtu();
  1370. if frag.buffer.len() < total_ip_len {
  1371. net_debug!(
  1372. "Fragmentation buffer is too small, at least {} needed. Dropping",
  1373. total_ip_len
  1374. );
  1375. return Ok(());
  1376. }
  1377. #[cfg(feature = "medium-ethernet")]
  1378. {
  1379. frag.ipv4.dst_hardware_addr = dst_hardware_addr;
  1380. }
  1381. // Save the total packet len (without the Ethernet header, but with the first
  1382. // IP header).
  1383. frag.packet_len = total_ip_len;
  1384. // Save the IP header for other fragments.
  1385. frag.ipv4.repr = *repr;
  1386. // Save how much bytes we will send now.
  1387. frag.sent_bytes = first_frag_ip_len;
  1388. // Modify the IP header
  1389. repr.payload_len = first_frag_ip_len - repr.buffer_len();
  1390. // Emit the IP header to the buffer.
  1391. emit_ip(&ip_repr, &mut frag.buffer);
  1392. let mut ipv4_packet = Ipv4Packet::new_unchecked(&mut frag.buffer[..]);
  1393. frag.ipv4.ident = ipv4_id;
  1394. ipv4_packet.set_ident(ipv4_id);
  1395. ipv4_packet.set_more_frags(true);
  1396. ipv4_packet.set_dont_frag(false);
  1397. ipv4_packet.set_frag_offset(0);
  1398. if caps.checksum.ipv4.tx() {
  1399. ipv4_packet.fill_checksum();
  1400. }
  1401. // Transmit the first packet.
  1402. tx_token.consume(tx_len, |mut tx_buffer| {
  1403. #[cfg(feature = "medium-ethernet")]
  1404. if matches!(self.caps.medium, Medium::Ethernet) {
  1405. emit_ethernet(&ip_repr, tx_buffer)?;
  1406. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1407. }
  1408. // Change the offset for the next packet.
  1409. frag.ipv4.frag_offset = (first_frag_ip_len - ip_header_len) as u16;
  1410. // Copy the IP header and the payload.
  1411. tx_buffer[..first_frag_ip_len]
  1412. .copy_from_slice(&frag.buffer[..first_frag_ip_len]);
  1413. Ok(())
  1414. })
  1415. }
  1416. #[cfg(not(feature = "proto-ipv4-fragmentation"))]
  1417. {
  1418. net_debug!("Enable the `proto-ipv4-fragmentation` feature for fragmentation support.");
  1419. Ok(())
  1420. }
  1421. } else {
  1422. tx_token.set_meta(meta);
  1423. // No fragmentation is required.
  1424. tx_token.consume(total_len, |mut tx_buffer| {
  1425. #[cfg(feature = "medium-ethernet")]
  1426. if matches!(self.caps.medium, Medium::Ethernet) {
  1427. emit_ethernet(&ip_repr, tx_buffer)?;
  1428. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1429. }
  1430. emit_ip(&ip_repr, tx_buffer);
  1431. Ok(())
  1432. })
  1433. }
  1434. }
  1435. // We don't support IPv6 fragmentation yet.
  1436. #[cfg(feature = "proto-ipv6")]
  1437. IpRepr::Ipv6(_) => tx_token.consume(total_len, |mut tx_buffer| {
  1438. #[cfg(feature = "medium-ethernet")]
  1439. if matches!(self.caps.medium, Medium::Ethernet) {
  1440. emit_ethernet(&ip_repr, tx_buffer)?;
  1441. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1442. }
  1443. emit_ip(&ip_repr, tx_buffer);
  1444. Ok(())
  1445. }),
  1446. }
  1447. }
  1448. }
  1449. #[derive(Debug, Clone, Copy, PartialEq, Eq)]
  1450. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  1451. enum DispatchError {
  1452. /// No route to dispatch this packet. Retrying won't help unless
  1453. /// configuration is changed.
  1454. NoRoute,
  1455. /// We do have a route to dispatch this packet, but we haven't discovered
  1456. /// the neighbor for it yet. Discovery has been initiated, dispatch
  1457. /// should be retried later.
  1458. NeighborPending,
  1459. }