mod.rs 46 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243
  1. // Heads up! Before working on this file you should read the parts
  2. // of RFC 1122 that discuss Ethernet, ARP and IP for any IPv4 work
  3. // and RFCs 8200 and 4861 for any IPv6 and NDISC work.
  4. #[cfg(test)]
  5. mod tests;
  6. #[cfg(feature = "medium-ethernet")]
  7. mod ethernet;
  8. #[cfg(feature = "medium-ieee802154")]
  9. mod ieee802154;
  10. #[cfg(feature = "proto-ipv4")]
  11. mod ipv4;
  12. #[cfg(feature = "proto-ipv6")]
  13. mod ipv6;
  14. #[cfg(feature = "proto-sixlowpan")]
  15. mod sixlowpan;
  16. #[cfg(feature = "proto-igmp")]
  17. mod igmp;
  18. #[cfg(feature = "socket-tcp")]
  19. mod tcp;
  20. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  21. mod udp;
  22. #[cfg(feature = "proto-igmp")]
  23. pub use igmp::MulticastError;
  24. use super::packet::*;
  25. use core::result::Result;
  26. use heapless::{LinearMap, Vec};
  27. #[cfg(feature = "_proto-fragmentation")]
  28. use super::fragmentation::FragKey;
  29. #[cfg(any(feature = "proto-ipv4", feature = "proto-sixlowpan"))]
  30. use super::fragmentation::PacketAssemblerSet;
  31. use super::fragmentation::{Fragmenter, FragmentsBuffer};
  32. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  33. use super::neighbor::{Answer as NeighborAnswer, Cache as NeighborCache};
  34. use super::socket_set::SocketSet;
  35. use crate::config::{
  36. IFACE_MAX_ADDR_COUNT, IFACE_MAX_MULTICAST_GROUP_COUNT,
  37. IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT,
  38. };
  39. use crate::iface::Routes;
  40. use crate::phy::PacketMeta;
  41. use crate::phy::{ChecksumCapabilities, Device, DeviceCapabilities, Medium, RxToken, TxToken};
  42. use crate::rand::Rand;
  43. use crate::socket::*;
  44. use crate::time::{Duration, Instant};
  45. use crate::wire::*;
  46. macro_rules! check {
  47. ($e:expr) => {
  48. match $e {
  49. Ok(x) => x,
  50. Err(_) => {
  51. // concat!/stringify! doesn't work with defmt macros
  52. #[cfg(not(feature = "defmt"))]
  53. net_trace!(concat!("iface: malformed ", stringify!($e)));
  54. #[cfg(feature = "defmt")]
  55. net_trace!("iface: malformed");
  56. return Default::default();
  57. }
  58. }
  59. };
  60. }
  61. use check;
  62. /// A network interface.
  63. ///
  64. /// The network interface logically owns a number of other data structures; to avoid
  65. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  66. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  67. pub struct Interface {
  68. pub(crate) inner: InterfaceInner,
  69. fragments: FragmentsBuffer,
  70. fragmenter: Fragmenter,
  71. }
  72. /// The device independent part of an Ethernet network interface.
  73. ///
  74. /// Separating the device from the data required for processing and dispatching makes
  75. /// it possible to borrow them independently. For example, the tx and rx tokens borrow
  76. /// the `device` mutably until they're used, which makes it impossible to call other
  77. /// methods on the `Interface` in this time (since its `device` field is borrowed
  78. /// exclusively). However, it is still possible to call methods on its `inner` field.
  79. pub struct InterfaceInner {
  80. caps: DeviceCapabilities,
  81. now: Instant,
  82. rand: Rand,
  83. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  84. neighbor_cache: NeighborCache,
  85. hardware_addr: HardwareAddress,
  86. #[cfg(feature = "medium-ieee802154")]
  87. sequence_no: u8,
  88. #[cfg(feature = "medium-ieee802154")]
  89. pan_id: Option<Ieee802154Pan>,
  90. #[cfg(feature = "proto-ipv4-fragmentation")]
  91. ipv4_id: u16,
  92. #[cfg(feature = "proto-sixlowpan")]
  93. sixlowpan_address_context:
  94. Vec<SixlowpanAddressContext, IFACE_MAX_SIXLOWPAN_ADDRESS_CONTEXT_COUNT>,
  95. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  96. tag: u16,
  97. ip_addrs: Vec<IpCidr, IFACE_MAX_ADDR_COUNT>,
  98. any_ip: bool,
  99. routes: Routes,
  100. #[cfg(any(feature = "proto-igmp", feature = "proto-ipv6"))]
  101. multicast_groups: LinearMap<IpAddress, (), IFACE_MAX_MULTICAST_GROUP_COUNT>,
  102. /// When to report for (all or) the next multicast group membership via IGMP
  103. #[cfg(feature = "proto-igmp")]
  104. igmp_report_state: IgmpReportState,
  105. }
  106. /// Configuration structure used for creating a network interface.
  107. #[non_exhaustive]
  108. pub struct Config {
  109. /// Random seed.
  110. ///
  111. /// It is strongly recommended that the random seed is different on each boot,
  112. /// to avoid problems with TCP port/sequence collisions.
  113. ///
  114. /// The seed doesn't have to be cryptographically secure.
  115. pub random_seed: u64,
  116. /// Set the Hardware address the interface will use.
  117. ///
  118. /// # Panics
  119. /// Creating the interface panics if the address is not unicast.
  120. pub hardware_addr: HardwareAddress,
  121. /// Set the IEEE802.15.4 PAN ID the interface will use.
  122. ///
  123. /// **NOTE**: we use the same PAN ID for destination and source.
  124. #[cfg(feature = "medium-ieee802154")]
  125. pub pan_id: Option<Ieee802154Pan>,
  126. }
  127. impl Config {
  128. pub fn new(hardware_addr: HardwareAddress) -> Self {
  129. Config {
  130. random_seed: 0,
  131. hardware_addr,
  132. #[cfg(feature = "medium-ieee802154")]
  133. pan_id: None,
  134. }
  135. }
  136. }
  137. impl Interface {
  138. /// Create a network interface using the previously provided configuration.
  139. ///
  140. /// # Panics
  141. /// This function panics if the [`Config::hardware_address`] does not match
  142. /// the medium of the device.
  143. pub fn new<D>(config: Config, device: &mut D, now: Instant) -> Self
  144. where
  145. D: Device + ?Sized,
  146. {
  147. let caps = device.capabilities();
  148. assert_eq!(
  149. config.hardware_addr.medium(),
  150. caps.medium,
  151. "The hardware address does not match the medium of the interface."
  152. );
  153. let mut rand = Rand::new(config.random_seed);
  154. #[cfg(feature = "medium-ieee802154")]
  155. let mut sequence_no;
  156. #[cfg(feature = "medium-ieee802154")]
  157. loop {
  158. sequence_no = (rand.rand_u32() & 0xff) as u8;
  159. if sequence_no != 0 {
  160. break;
  161. }
  162. }
  163. #[cfg(feature = "proto-sixlowpan")]
  164. let mut tag;
  165. #[cfg(feature = "proto-sixlowpan")]
  166. loop {
  167. tag = rand.rand_u16();
  168. if tag != 0 {
  169. break;
  170. }
  171. }
  172. #[cfg(feature = "proto-ipv4")]
  173. let mut ipv4_id;
  174. #[cfg(feature = "proto-ipv4")]
  175. loop {
  176. ipv4_id = rand.rand_u16();
  177. if ipv4_id != 0 {
  178. break;
  179. }
  180. }
  181. Interface {
  182. fragments: FragmentsBuffer {
  183. #[cfg(feature = "proto-sixlowpan")]
  184. decompress_buf: [0u8; sixlowpan::MAX_DECOMPRESSED_LEN],
  185. #[cfg(feature = "_proto-fragmentation")]
  186. assembler: PacketAssemblerSet::new(),
  187. #[cfg(feature = "_proto-fragmentation")]
  188. reassembly_timeout: Duration::from_secs(60),
  189. },
  190. fragmenter: Fragmenter::new(),
  191. inner: InterfaceInner {
  192. now,
  193. caps,
  194. hardware_addr: config.hardware_addr,
  195. ip_addrs: Vec::new(),
  196. any_ip: false,
  197. routes: Routes::new(),
  198. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  199. neighbor_cache: NeighborCache::new(),
  200. #[cfg(any(feature = "proto-igmp", feature = "proto-ipv6"))]
  201. multicast_groups: LinearMap::new(),
  202. #[cfg(feature = "proto-igmp")]
  203. igmp_report_state: IgmpReportState::Inactive,
  204. #[cfg(feature = "medium-ieee802154")]
  205. sequence_no,
  206. #[cfg(feature = "medium-ieee802154")]
  207. pan_id: config.pan_id,
  208. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  209. tag,
  210. #[cfg(feature = "proto-ipv4-fragmentation")]
  211. ipv4_id,
  212. #[cfg(feature = "proto-sixlowpan")]
  213. sixlowpan_address_context: Vec::new(),
  214. rand,
  215. },
  216. }
  217. }
  218. /// Get the socket context.
  219. ///
  220. /// The context is needed for some socket methods.
  221. pub fn context(&mut self) -> &mut InterfaceInner {
  222. &mut self.inner
  223. }
  224. /// Get the HardwareAddress address of the interface.
  225. ///
  226. /// # Panics
  227. /// This function panics if the medium is not Ethernet or Ieee802154.
  228. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  229. pub fn hardware_addr(&self) -> HardwareAddress {
  230. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  231. assert!(self.inner.caps.medium == Medium::Ethernet);
  232. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  233. assert!(self.inner.caps.medium == Medium::Ieee802154);
  234. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  235. assert!(
  236. self.inner.caps.medium == Medium::Ethernet
  237. || self.inner.caps.medium == Medium::Ieee802154
  238. );
  239. self.inner.hardware_addr
  240. }
  241. /// Set the HardwareAddress address of the interface.
  242. ///
  243. /// # Panics
  244. /// This function panics if the address is not unicast, and if the medium is not Ethernet or
  245. /// Ieee802154.
  246. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  247. pub fn set_hardware_addr(&mut self, addr: HardwareAddress) {
  248. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  249. assert!(self.inner.caps.medium == Medium::Ethernet);
  250. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  251. assert!(self.inner.caps.medium == Medium::Ieee802154);
  252. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  253. assert!(
  254. self.inner.caps.medium == Medium::Ethernet
  255. || self.inner.caps.medium == Medium::Ieee802154
  256. );
  257. InterfaceInner::check_hardware_addr(&addr);
  258. self.inner.hardware_addr = addr;
  259. }
  260. /// Get the IP addresses of the interface.
  261. pub fn ip_addrs(&self) -> &[IpCidr] {
  262. self.inner.ip_addrs.as_ref()
  263. }
  264. /// Get the first IPv4 address if present.
  265. #[cfg(feature = "proto-ipv4")]
  266. pub fn ipv4_addr(&self) -> Option<Ipv4Address> {
  267. self.inner.ipv4_addr()
  268. }
  269. /// Get the first IPv6 address if present.
  270. #[cfg(feature = "proto-ipv6")]
  271. pub fn ipv6_addr(&self) -> Option<Ipv6Address> {
  272. self.inner.ipv6_addr()
  273. }
  274. /// Get an address from the interface that could be used as source address. For IPv4, this is
  275. /// the first IPv4 address from the list of addresses. For IPv6, the address is based on the
  276. /// destination address and uses RFC6724 for selecting the source address.
  277. pub fn get_source_address(&self, dst_addr: &IpAddress) -> Option<IpAddress> {
  278. self.inner.get_source_address(dst_addr)
  279. }
  280. /// Get an address from the interface that could be used as source address. This is the first
  281. /// IPv4 address from the list of addresses in the interface.
  282. #[cfg(feature = "proto-ipv4")]
  283. pub fn get_source_address_ipv4(&self, dst_addr: &Ipv4Address) -> Option<Ipv4Address> {
  284. self.inner.get_source_address_ipv4(dst_addr)
  285. }
  286. /// Get an address from the interface that could be used as source address. The selection is
  287. /// based on RFC6724.
  288. #[cfg(feature = "proto-ipv6")]
  289. pub fn get_source_address_ipv6(&self, dst_addr: &Ipv6Address) -> Ipv6Address {
  290. self.inner.get_source_address_ipv6(dst_addr)
  291. }
  292. /// Update the IP addresses of the interface.
  293. ///
  294. /// # Panics
  295. /// This function panics if any of the addresses are not unicast.
  296. pub fn update_ip_addrs<F: FnOnce(&mut Vec<IpCidr, IFACE_MAX_ADDR_COUNT>)>(&mut self, f: F) {
  297. f(&mut self.inner.ip_addrs);
  298. InterfaceInner::flush_neighbor_cache(&mut self.inner);
  299. InterfaceInner::check_ip_addrs(&self.inner.ip_addrs)
  300. }
  301. /// Check whether the interface has the given IP address assigned.
  302. pub fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  303. self.inner.has_ip_addr(addr)
  304. }
  305. pub fn routes(&self) -> &Routes {
  306. &self.inner.routes
  307. }
  308. pub fn routes_mut(&mut self) -> &mut Routes {
  309. &mut self.inner.routes
  310. }
  311. /// Enable or disable the AnyIP capability.
  312. ///
  313. /// AnyIP allowins packets to be received
  314. /// locally on IP addresses other than the interface's configured [ip_addrs].
  315. /// When AnyIP is enabled and a route prefix in [`routes`](Self::routes) specifies one of
  316. /// the interface's [`ip_addrs`](Self::ip_addrs) as its gateway, the interface will accept
  317. /// packets addressed to that prefix.
  318. pub fn set_any_ip(&mut self, any_ip: bool) {
  319. self.inner.any_ip = any_ip;
  320. }
  321. /// Get whether AnyIP is enabled.
  322. ///
  323. /// See [`set_any_ip`](Self::set_any_ip) for details on AnyIP
  324. pub fn any_ip(&self) -> bool {
  325. self.inner.any_ip
  326. }
  327. /// Get the packet reassembly timeout.
  328. #[cfg(feature = "_proto-fragmentation")]
  329. pub fn reassembly_timeout(&self) -> Duration {
  330. self.fragments.reassembly_timeout
  331. }
  332. /// Set the packet reassembly timeout.
  333. #[cfg(feature = "_proto-fragmentation")]
  334. pub fn set_reassembly_timeout(&mut self, timeout: Duration) {
  335. if timeout > Duration::from_secs(60) {
  336. net_debug!("RFC 4944 specifies that the reassembly timeout MUST be set to a maximum of 60 seconds");
  337. }
  338. self.fragments.reassembly_timeout = timeout;
  339. }
  340. /// Transmit packets queued in the given sockets, and receive packets queued
  341. /// in the device.
  342. ///
  343. /// This function returns a boolean value indicating whether any packets were
  344. /// processed or emitted, and thus, whether the readiness of any socket might
  345. /// have changed.
  346. ///
  347. /// # Note
  348. /// This function performs a bounded amount of work per call to avoid
  349. /// starving other tasks of CPU time. If it returns true, there may still be
  350. /// packets to be received or transmitted. Depending on system design,
  351. /// calling this function in a loop may cause a denial of service if
  352. /// packets cannot be processed faster than they arrive.
  353. pub fn poll<D>(
  354. &mut self,
  355. timestamp: Instant,
  356. device: &mut D,
  357. sockets: &mut SocketSet<'_>,
  358. ) -> bool
  359. where
  360. D: Device + ?Sized,
  361. {
  362. self.inner.now = timestamp;
  363. #[cfg(feature = "_proto-fragmentation")]
  364. self.fragments.assembler.remove_expired(timestamp);
  365. match self.inner.caps.medium {
  366. #[cfg(feature = "medium-ieee802154")]
  367. Medium::Ieee802154 =>
  368. {
  369. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  370. if self.sixlowpan_egress(device) {
  371. return true;
  372. }
  373. }
  374. #[cfg(any(feature = "medium-ethernet", feature = "medium-ip"))]
  375. _ =>
  376. {
  377. #[cfg(feature = "proto-ipv4-fragmentation")]
  378. if self.ipv4_egress(device) {
  379. return true;
  380. }
  381. }
  382. }
  383. let mut readiness_may_have_changed = self.socket_ingress(device, sockets);
  384. readiness_may_have_changed |= self.socket_egress(device, sockets);
  385. #[cfg(feature = "proto-igmp")]
  386. {
  387. readiness_may_have_changed |= self.igmp_egress(device);
  388. }
  389. readiness_may_have_changed
  390. }
  391. /// Return a _soft deadline_ for calling [poll] the next time.
  392. /// The [Instant] returned is the time at which you should call [poll] next.
  393. /// It is harmless (but wastes energy) to call it before the [Instant], and
  394. /// potentially harmful (impacting quality of service) to call it after the
  395. /// [Instant]
  396. ///
  397. /// [poll]: #method.poll
  398. /// [Instant]: struct.Instant.html
  399. pub fn poll_at(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Instant> {
  400. self.inner.now = timestamp;
  401. #[cfg(feature = "_proto-fragmentation")]
  402. if !self.fragmenter.is_empty() {
  403. return Some(Instant::from_millis(0));
  404. }
  405. let inner = &mut self.inner;
  406. sockets
  407. .items()
  408. .filter_map(move |item| {
  409. let socket_poll_at = item.socket.poll_at(inner);
  410. match item
  411. .meta
  412. .poll_at(socket_poll_at, |ip_addr| inner.has_neighbor(&ip_addr))
  413. {
  414. PollAt::Ingress => None,
  415. PollAt::Time(instant) => Some(instant),
  416. PollAt::Now => Some(Instant::from_millis(0)),
  417. }
  418. })
  419. .min()
  420. }
  421. /// Return an _advisory wait time_ for calling [poll] the next time.
  422. /// The [Duration] returned is the time left to wait before calling [poll] next.
  423. /// It is harmless (but wastes energy) to call it before the [Duration] has passed,
  424. /// and potentially harmful (impacting quality of service) to call it after the
  425. /// [Duration] has passed.
  426. ///
  427. /// [poll]: #method.poll
  428. /// [Duration]: struct.Duration.html
  429. pub fn poll_delay(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Duration> {
  430. match self.poll_at(timestamp, sockets) {
  431. Some(poll_at) if timestamp < poll_at => Some(poll_at - timestamp),
  432. Some(_) => Some(Duration::from_millis(0)),
  433. _ => None,
  434. }
  435. }
  436. fn socket_ingress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  437. where
  438. D: Device + ?Sized,
  439. {
  440. let mut processed_any = false;
  441. let Some((rx_token, tx_token)) = device.receive(self.inner.now) else {
  442. return processed_any;
  443. };
  444. let rx_meta = rx_token.meta();
  445. rx_token.consume(|frame| {
  446. if frame.is_empty() {
  447. return;
  448. }
  449. match self.inner.caps.medium {
  450. #[cfg(feature = "medium-ethernet")]
  451. Medium::Ethernet => {
  452. if let Some(packet) =
  453. self.inner
  454. .process_ethernet(sockets, rx_meta, frame, &mut self.fragments)
  455. {
  456. if let Err(err) =
  457. self.inner.dispatch(tx_token, packet, &mut self.fragmenter)
  458. {
  459. net_debug!("Failed to send response: {:?}", err);
  460. }
  461. }
  462. }
  463. #[cfg(feature = "medium-ip")]
  464. Medium::Ip => {
  465. if let Some(packet) =
  466. self.inner
  467. .process_ip(sockets, rx_meta, frame, &mut self.fragments)
  468. {
  469. if let Err(err) = self.inner.dispatch_ip(
  470. tx_token,
  471. PacketMeta::default(),
  472. packet,
  473. &mut self.fragmenter,
  474. ) {
  475. net_debug!("Failed to send response: {:?}", err);
  476. }
  477. }
  478. }
  479. #[cfg(feature = "medium-ieee802154")]
  480. Medium::Ieee802154 => {
  481. if let Some(packet) =
  482. self.inner
  483. .process_ieee802154(sockets, rx_meta, frame, &mut self.fragments)
  484. {
  485. if let Err(err) = self.inner.dispatch_ip(
  486. tx_token,
  487. PacketMeta::default(),
  488. packet,
  489. &mut self.fragmenter,
  490. ) {
  491. net_debug!("Failed to send response: {:?}", err);
  492. }
  493. }
  494. }
  495. }
  496. processed_any = true;
  497. });
  498. processed_any
  499. }
  500. fn socket_egress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  501. where
  502. D: Device + ?Sized,
  503. {
  504. let _caps = device.capabilities();
  505. enum EgressError {
  506. Exhausted,
  507. Dispatch,
  508. }
  509. let mut emitted_any = false;
  510. for item in sockets.items_mut() {
  511. if !item
  512. .meta
  513. .egress_permitted(self.inner.now, |ip_addr| self.inner.has_neighbor(&ip_addr))
  514. {
  515. continue;
  516. }
  517. let mut neighbor_addr = None;
  518. let mut respond = |inner: &mut InterfaceInner, meta: PacketMeta, response: Packet| {
  519. neighbor_addr = Some(response.ip_repr().dst_addr());
  520. let t = device.transmit(inner.now).ok_or_else(|| {
  521. net_debug!("failed to transmit IP: device exhausted");
  522. EgressError::Exhausted
  523. })?;
  524. inner
  525. .dispatch_ip(t, meta, response, &mut self.fragmenter)
  526. .map_err(|_| EgressError::Dispatch)?;
  527. emitted_any = true;
  528. Ok(())
  529. };
  530. let result = match &mut item.socket {
  531. #[cfg(feature = "socket-raw")]
  532. Socket::Raw(socket) => socket.dispatch(&mut self.inner, |inner, (ip, raw)| {
  533. respond(
  534. inner,
  535. PacketMeta::default(),
  536. Packet::new(ip, IpPayload::Raw(raw)),
  537. )
  538. }),
  539. #[cfg(feature = "socket-icmp")]
  540. Socket::Icmp(socket) => {
  541. socket.dispatch(&mut self.inner, |inner, response| match response {
  542. #[cfg(feature = "proto-ipv4")]
  543. (IpRepr::Ipv4(ipv4_repr), IcmpRepr::Ipv4(icmpv4_repr)) => respond(
  544. inner,
  545. PacketMeta::default(),
  546. Packet::new_ipv4(ipv4_repr, IpPayload::Icmpv4(icmpv4_repr)),
  547. ),
  548. #[cfg(feature = "proto-ipv6")]
  549. (IpRepr::Ipv6(ipv6_repr), IcmpRepr::Ipv6(icmpv6_repr)) => respond(
  550. inner,
  551. PacketMeta::default(),
  552. Packet::new_ipv6(ipv6_repr, IpPayload::Icmpv6(icmpv6_repr)),
  553. ),
  554. #[allow(unreachable_patterns)]
  555. _ => unreachable!(),
  556. })
  557. }
  558. #[cfg(feature = "socket-udp")]
  559. Socket::Udp(socket) => {
  560. socket.dispatch(&mut self.inner, |inner, meta, (ip, udp, payload)| {
  561. respond(inner, meta, Packet::new(ip, IpPayload::Udp(udp, payload)))
  562. })
  563. }
  564. #[cfg(feature = "socket-tcp")]
  565. Socket::Tcp(socket) => socket.dispatch(&mut self.inner, |inner, (ip, tcp)| {
  566. respond(
  567. inner,
  568. PacketMeta::default(),
  569. Packet::new(ip, IpPayload::Tcp(tcp)),
  570. )
  571. }),
  572. #[cfg(feature = "socket-dhcpv4")]
  573. Socket::Dhcpv4(socket) => {
  574. socket.dispatch(&mut self.inner, |inner, (ip, udp, dhcp)| {
  575. respond(
  576. inner,
  577. PacketMeta::default(),
  578. Packet::new_ipv4(ip, IpPayload::Dhcpv4(udp, dhcp)),
  579. )
  580. })
  581. }
  582. #[cfg(feature = "socket-dns")]
  583. Socket::Dns(socket) => socket.dispatch(&mut self.inner, |inner, (ip, udp, dns)| {
  584. respond(
  585. inner,
  586. PacketMeta::default(),
  587. Packet::new(ip, IpPayload::Udp(udp, dns)),
  588. )
  589. }),
  590. };
  591. match result {
  592. Err(EgressError::Exhausted) => break, // Device buffer full.
  593. Err(EgressError::Dispatch) => {
  594. // `NeighborCache` already takes care of rate limiting the neighbor discovery
  595. // requests from the socket. However, without an additional rate limiting
  596. // mechanism, we would spin on every socket that has yet to discover its
  597. // neighbor.
  598. item.meta.neighbor_missing(
  599. self.inner.now,
  600. neighbor_addr.expect("non-IP response packet"),
  601. );
  602. }
  603. Ok(()) => {}
  604. }
  605. }
  606. emitted_any
  607. }
  608. }
  609. impl InterfaceInner {
  610. #[allow(unused)] // unused depending on which sockets are enabled
  611. pub(crate) fn now(&self) -> Instant {
  612. self.now
  613. }
  614. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  615. #[allow(unused)] // unused depending on which sockets are enabled
  616. pub(crate) fn hardware_addr(&self) -> HardwareAddress {
  617. self.hardware_addr
  618. }
  619. #[allow(unused)] // unused depending on which sockets are enabled
  620. pub(crate) fn checksum_caps(&self) -> ChecksumCapabilities {
  621. self.caps.checksum.clone()
  622. }
  623. #[allow(unused)] // unused depending on which sockets are enabled
  624. pub(crate) fn ip_mtu(&self) -> usize {
  625. self.caps.ip_mtu()
  626. }
  627. #[allow(unused)] // unused depending on which sockets are enabled, and in tests
  628. pub(crate) fn rand(&mut self) -> &mut Rand {
  629. &mut self.rand
  630. }
  631. #[allow(unused)] // unused depending on which sockets are enabled
  632. pub(crate) fn get_source_address(&self, dst_addr: &IpAddress) -> Option<IpAddress> {
  633. match dst_addr {
  634. #[cfg(feature = "proto-ipv4")]
  635. IpAddress::Ipv4(addr) => self.get_source_address_ipv4(addr).map(|a| a.into()),
  636. #[cfg(feature = "proto-ipv6")]
  637. IpAddress::Ipv6(addr) => Some(self.get_source_address_ipv6(addr).into()),
  638. }
  639. }
  640. #[cfg(test)]
  641. #[allow(unused)] // unused depending on which sockets are enabled
  642. pub(crate) fn set_now(&mut self, now: Instant) {
  643. self.now = now
  644. }
  645. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  646. fn check_hardware_addr(addr: &HardwareAddress) {
  647. if !addr.is_unicast() {
  648. panic!("Hardware address {addr} is not unicast")
  649. }
  650. }
  651. fn check_ip_addrs(addrs: &[IpCidr]) {
  652. for cidr in addrs {
  653. if !cidr.address().is_unicast() && !cidr.address().is_unspecified() {
  654. panic!("IP address {} is not unicast", cidr.address())
  655. }
  656. }
  657. }
  658. /// Check whether the interface has the given IP address assigned.
  659. fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  660. let addr = addr.into();
  661. self.ip_addrs.iter().any(|probe| probe.address() == addr)
  662. }
  663. /// Check whether the interface listens to given destination multicast IP address.
  664. ///
  665. /// If built without feature `proto-igmp` this function will
  666. /// always return `false` when using IPv4.
  667. fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  668. let addr = addr.into();
  669. match addr {
  670. #[cfg(feature = "proto-igmp")]
  671. IpAddress::Ipv4(key) => {
  672. key == Ipv4Address::MULTICAST_ALL_SYSTEMS
  673. || self.multicast_groups.get(&addr).is_some()
  674. }
  675. #[cfg(feature = "proto-ipv6")]
  676. IpAddress::Ipv6(key) => {
  677. key == Ipv6Address::LINK_LOCAL_ALL_NODES
  678. || self.has_solicited_node(key)
  679. || self.multicast_groups.get(&addr).is_some()
  680. }
  681. #[cfg(feature = "proto-rpl")]
  682. IpAddress::Ipv6(Ipv6Address::LINK_LOCAL_ALL_RPL_NODES) => true,
  683. #[allow(unreachable_patterns)]
  684. _ => false,
  685. }
  686. }
  687. #[cfg(feature = "medium-ip")]
  688. fn process_ip<'frame>(
  689. &mut self,
  690. sockets: &mut SocketSet,
  691. meta: PacketMeta,
  692. ip_payload: &'frame [u8],
  693. frag: &'frame mut FragmentsBuffer,
  694. ) -> Option<Packet<'frame>> {
  695. match IpVersion::of_packet(ip_payload) {
  696. #[cfg(feature = "proto-ipv4")]
  697. Ok(IpVersion::Ipv4) => {
  698. let ipv4_packet = check!(Ipv4Packet::new_checked(ip_payload));
  699. self.process_ipv4(sockets, meta, HardwareAddress::Ip, &ipv4_packet, frag)
  700. }
  701. #[cfg(feature = "proto-ipv6")]
  702. Ok(IpVersion::Ipv6) => {
  703. let ipv6_packet = check!(Ipv6Packet::new_checked(ip_payload));
  704. self.process_ipv6(sockets, meta, HardwareAddress::Ip, &ipv6_packet)
  705. }
  706. // Drop all other traffic.
  707. _ => None,
  708. }
  709. }
  710. #[cfg(feature = "socket-raw")]
  711. fn raw_socket_filter(
  712. &mut self,
  713. sockets: &mut SocketSet,
  714. ip_repr: &IpRepr,
  715. ip_payload: &[u8],
  716. ) -> bool {
  717. let mut handled_by_raw_socket = false;
  718. // Pass every IP packet to all raw sockets we have registered.
  719. for raw_socket in sockets
  720. .items_mut()
  721. .filter_map(|i| raw::Socket::downcast_mut(&mut i.socket))
  722. {
  723. if raw_socket.accepts(ip_repr) {
  724. raw_socket.process(self, ip_repr, ip_payload);
  725. handled_by_raw_socket = true;
  726. }
  727. }
  728. handled_by_raw_socket
  729. }
  730. /// Checks if an address is broadcast, taking into account ipv4 subnet-local
  731. /// broadcast addresses.
  732. pub(crate) fn is_broadcast(&self, address: &IpAddress) -> bool {
  733. match address {
  734. #[cfg(feature = "proto-ipv4")]
  735. IpAddress::Ipv4(address) => self.is_broadcast_v4(*address),
  736. #[cfg(feature = "proto-ipv6")]
  737. IpAddress::Ipv6(_) => false,
  738. }
  739. }
  740. #[cfg(feature = "medium-ethernet")]
  741. fn dispatch<Tx>(
  742. &mut self,
  743. tx_token: Tx,
  744. packet: EthernetPacket,
  745. frag: &mut Fragmenter,
  746. ) -> Result<(), DispatchError>
  747. where
  748. Tx: TxToken,
  749. {
  750. match packet {
  751. #[cfg(feature = "proto-ipv4")]
  752. EthernetPacket::Arp(arp_repr) => {
  753. let dst_hardware_addr = match arp_repr {
  754. ArpRepr::EthernetIpv4 {
  755. target_hardware_addr,
  756. ..
  757. } => target_hardware_addr,
  758. };
  759. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  760. frame.set_dst_addr(dst_hardware_addr);
  761. frame.set_ethertype(EthernetProtocol::Arp);
  762. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  763. arp_repr.emit(&mut packet);
  764. })
  765. }
  766. EthernetPacket::Ip(packet) => {
  767. self.dispatch_ip(tx_token, PacketMeta::default(), packet, frag)
  768. }
  769. }
  770. }
  771. fn in_same_network(&self, addr: &IpAddress) -> bool {
  772. self.ip_addrs.iter().any(|cidr| cidr.contains_addr(addr))
  773. }
  774. fn route(&self, addr: &IpAddress, timestamp: Instant) -> Option<IpAddress> {
  775. // Send directly.
  776. // note: no need to use `self.is_broadcast()` to check for subnet-local broadcast addrs
  777. // here because `in_same_network` will already return true.
  778. if self.in_same_network(addr) || addr.is_broadcast() {
  779. return Some(*addr);
  780. }
  781. // Route via a router.
  782. self.routes.lookup(addr, timestamp)
  783. }
  784. fn has_neighbor(&self, addr: &IpAddress) -> bool {
  785. match self.route(addr, self.now) {
  786. Some(_routed_addr) => match self.caps.medium {
  787. #[cfg(feature = "medium-ethernet")]
  788. Medium::Ethernet => self.neighbor_cache.lookup(&_routed_addr, self.now).found(),
  789. #[cfg(feature = "medium-ieee802154")]
  790. Medium::Ieee802154 => self.neighbor_cache.lookup(&_routed_addr, self.now).found(),
  791. #[cfg(feature = "medium-ip")]
  792. Medium::Ip => true,
  793. },
  794. None => false,
  795. }
  796. }
  797. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  798. fn lookup_hardware_addr<Tx>(
  799. &mut self,
  800. tx_token: Tx,
  801. dst_addr: &IpAddress,
  802. fragmenter: &mut Fragmenter,
  803. ) -> Result<(HardwareAddress, Tx), DispatchError>
  804. where
  805. Tx: TxToken,
  806. {
  807. if self.is_broadcast(dst_addr) {
  808. let hardware_addr = match self.caps.medium {
  809. #[cfg(feature = "medium-ethernet")]
  810. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::BROADCAST),
  811. #[cfg(feature = "medium-ieee802154")]
  812. Medium::Ieee802154 => HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST),
  813. #[cfg(feature = "medium-ip")]
  814. Medium::Ip => unreachable!(),
  815. };
  816. return Ok((hardware_addr, tx_token));
  817. }
  818. if dst_addr.is_multicast() {
  819. let b = dst_addr.as_bytes();
  820. let hardware_addr = match *dst_addr {
  821. #[cfg(feature = "proto-ipv4")]
  822. IpAddress::Ipv4(_addr) => match self.caps.medium {
  823. #[cfg(feature = "medium-ethernet")]
  824. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  825. 0x01,
  826. 0x00,
  827. 0x5e,
  828. b[1] & 0x7F,
  829. b[2],
  830. b[3],
  831. ])),
  832. #[cfg(feature = "medium-ieee802154")]
  833. Medium::Ieee802154 => unreachable!(),
  834. #[cfg(feature = "medium-ip")]
  835. Medium::Ip => unreachable!(),
  836. },
  837. #[cfg(feature = "proto-ipv6")]
  838. IpAddress::Ipv6(_addr) => match self.caps.medium {
  839. #[cfg(feature = "medium-ethernet")]
  840. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  841. 0x33, 0x33, b[12], b[13], b[14], b[15],
  842. ])),
  843. #[cfg(feature = "medium-ieee802154")]
  844. Medium::Ieee802154 => {
  845. // Not sure if this is correct
  846. HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST)
  847. }
  848. #[cfg(feature = "medium-ip")]
  849. Medium::Ip => unreachable!(),
  850. },
  851. };
  852. return Ok((hardware_addr, tx_token));
  853. }
  854. let dst_addr = self
  855. .route(dst_addr, self.now)
  856. .ok_or(DispatchError::NoRoute)?;
  857. match self.neighbor_cache.lookup(&dst_addr, self.now) {
  858. NeighborAnswer::Found(hardware_addr) => return Ok((hardware_addr, tx_token)),
  859. NeighborAnswer::RateLimited => return Err(DispatchError::NeighborPending),
  860. _ => (), // XXX
  861. }
  862. match dst_addr {
  863. #[cfg(all(feature = "medium-ethernet", feature = "proto-ipv4"))]
  864. IpAddress::Ipv4(dst_addr) if matches!(self.caps.medium, Medium::Ethernet) => {
  865. net_debug!(
  866. "address {} not in neighbor cache, sending ARP request",
  867. dst_addr
  868. );
  869. let src_hardware_addr = self.hardware_addr.ethernet_or_panic();
  870. let arp_repr = ArpRepr::EthernetIpv4 {
  871. operation: ArpOperation::Request,
  872. source_hardware_addr: src_hardware_addr,
  873. source_protocol_addr: self
  874. .get_source_address_ipv4(&dst_addr)
  875. .ok_or(DispatchError::NoRoute)?,
  876. target_hardware_addr: EthernetAddress::BROADCAST,
  877. target_protocol_addr: dst_addr,
  878. };
  879. if let Err(e) =
  880. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  881. frame.set_dst_addr(EthernetAddress::BROADCAST);
  882. frame.set_ethertype(EthernetProtocol::Arp);
  883. arp_repr.emit(&mut ArpPacket::new_unchecked(frame.payload_mut()))
  884. })
  885. {
  886. net_debug!("Failed to dispatch ARP request: {:?}", e);
  887. return Err(DispatchError::NeighborPending);
  888. }
  889. }
  890. #[cfg(feature = "proto-ipv6")]
  891. IpAddress::Ipv6(dst_addr) => {
  892. net_debug!(
  893. "address {} not in neighbor cache, sending Neighbor Solicitation",
  894. dst_addr
  895. );
  896. let solicit = Icmpv6Repr::Ndisc(NdiscRepr::NeighborSolicit {
  897. target_addr: dst_addr,
  898. lladdr: Some(self.hardware_addr.into()),
  899. });
  900. let packet = Packet::new_ipv6(
  901. Ipv6Repr {
  902. src_addr: self.get_source_address_ipv6(&dst_addr),
  903. dst_addr: dst_addr.solicited_node(),
  904. next_header: IpProtocol::Icmpv6,
  905. payload_len: solicit.buffer_len(),
  906. hop_limit: 0xff,
  907. },
  908. IpPayload::Icmpv6(solicit),
  909. );
  910. if let Err(e) =
  911. self.dispatch_ip(tx_token, PacketMeta::default(), packet, fragmenter)
  912. {
  913. net_debug!("Failed to dispatch NDISC solicit: {:?}", e);
  914. return Err(DispatchError::NeighborPending);
  915. }
  916. }
  917. #[allow(unreachable_patterns)]
  918. _ => (),
  919. }
  920. // The request got dispatched, limit the rate on the cache.
  921. self.neighbor_cache.limit_rate(self.now);
  922. Err(DispatchError::NeighborPending)
  923. }
  924. fn flush_neighbor_cache(&mut self) {
  925. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  926. self.neighbor_cache.flush()
  927. }
  928. fn dispatch_ip<Tx: TxToken>(
  929. &mut self,
  930. // NOTE(unused_mut): tx_token isn't always mutated, depending on
  931. // the feature set that is used.
  932. #[allow(unused_mut)] mut tx_token: Tx,
  933. meta: PacketMeta,
  934. packet: Packet,
  935. frag: &mut Fragmenter,
  936. ) -> Result<(), DispatchError> {
  937. let mut ip_repr = packet.ip_repr();
  938. assert!(!ip_repr.dst_addr().is_unspecified());
  939. // Dispatch IEEE802.15.4:
  940. #[cfg(feature = "medium-ieee802154")]
  941. if matches!(self.caps.medium, Medium::Ieee802154) {
  942. let (addr, tx_token) =
  943. self.lookup_hardware_addr(tx_token, &ip_repr.dst_addr(), frag)?;
  944. let addr = addr.ieee802154_or_panic();
  945. self.dispatch_ieee802154(addr, tx_token, meta, packet, frag);
  946. return Ok(());
  947. }
  948. // Dispatch IP/Ethernet:
  949. let caps = self.caps.clone();
  950. #[cfg(feature = "proto-ipv4-fragmentation")]
  951. let ipv4_id = self.next_ipv4_frag_ident();
  952. // First we calculate the total length that we will have to emit.
  953. let mut total_len = ip_repr.buffer_len();
  954. // Add the size of the Ethernet header if the medium is Ethernet.
  955. #[cfg(feature = "medium-ethernet")]
  956. if matches!(self.caps.medium, Medium::Ethernet) {
  957. total_len = EthernetFrame::<&[u8]>::buffer_len(total_len);
  958. }
  959. // If the medium is Ethernet, then we need to retrieve the destination hardware address.
  960. #[cfg(feature = "medium-ethernet")]
  961. let (dst_hardware_addr, mut tx_token) = match self.caps.medium {
  962. Medium::Ethernet => {
  963. match self.lookup_hardware_addr(tx_token, &ip_repr.dst_addr(), frag)? {
  964. (HardwareAddress::Ethernet(addr), tx_token) => (addr, tx_token),
  965. (_, _) => unreachable!(),
  966. }
  967. }
  968. _ => (EthernetAddress([0; 6]), tx_token),
  969. };
  970. // Emit function for the Ethernet header.
  971. #[cfg(feature = "medium-ethernet")]
  972. let emit_ethernet = |repr: &IpRepr, tx_buffer: &mut [u8]| {
  973. let mut frame = EthernetFrame::new_unchecked(tx_buffer);
  974. let src_addr = self.hardware_addr.ethernet_or_panic();
  975. frame.set_src_addr(src_addr);
  976. frame.set_dst_addr(dst_hardware_addr);
  977. match repr.version() {
  978. #[cfg(feature = "proto-ipv4")]
  979. IpVersion::Ipv4 => frame.set_ethertype(EthernetProtocol::Ipv4),
  980. #[cfg(feature = "proto-ipv6")]
  981. IpVersion::Ipv6 => frame.set_ethertype(EthernetProtocol::Ipv6),
  982. }
  983. Ok(())
  984. };
  985. // Emit function for the IP header and payload.
  986. let emit_ip = |repr: &IpRepr, mut tx_buffer: &mut [u8]| {
  987. repr.emit(&mut tx_buffer, &self.caps.checksum);
  988. let payload = &mut tx_buffer[repr.header_len()..];
  989. packet.emit_payload(repr, payload, &caps)
  990. };
  991. let total_ip_len = ip_repr.buffer_len();
  992. match &mut ip_repr {
  993. #[cfg(feature = "proto-ipv4")]
  994. IpRepr::Ipv4(repr) => {
  995. // If we have an IPv4 packet, then we need to check if we need to fragment it.
  996. if total_ip_len > self.caps.max_transmission_unit {
  997. #[cfg(feature = "proto-ipv4-fragmentation")]
  998. {
  999. net_debug!("start fragmentation");
  1000. // Calculate how much we will send now (including the Ethernet header).
  1001. let tx_len = self.caps.max_transmission_unit;
  1002. let ip_header_len = repr.buffer_len();
  1003. let first_frag_ip_len = self.caps.ip_mtu();
  1004. if frag.buffer.len() < total_ip_len {
  1005. net_debug!(
  1006. "Fragmentation buffer is too small, at least {} needed. Dropping",
  1007. total_ip_len
  1008. );
  1009. return Ok(());
  1010. }
  1011. #[cfg(feature = "medium-ethernet")]
  1012. {
  1013. frag.ipv4.dst_hardware_addr = dst_hardware_addr;
  1014. }
  1015. // Save the total packet len (without the Ethernet header, but with the first
  1016. // IP header).
  1017. frag.packet_len = total_ip_len;
  1018. // Save the IP header for other fragments.
  1019. frag.ipv4.repr = *repr;
  1020. // Save how much bytes we will send now.
  1021. frag.sent_bytes = first_frag_ip_len;
  1022. // Modify the IP header
  1023. repr.payload_len = first_frag_ip_len - repr.buffer_len();
  1024. // Emit the IP header to the buffer.
  1025. emit_ip(&ip_repr, &mut frag.buffer);
  1026. let mut ipv4_packet = Ipv4Packet::new_unchecked(&mut frag.buffer[..]);
  1027. frag.ipv4.ident = ipv4_id;
  1028. ipv4_packet.set_ident(ipv4_id);
  1029. ipv4_packet.set_more_frags(true);
  1030. ipv4_packet.set_dont_frag(false);
  1031. ipv4_packet.set_frag_offset(0);
  1032. if caps.checksum.ipv4.tx() {
  1033. ipv4_packet.fill_checksum();
  1034. }
  1035. // Transmit the first packet.
  1036. tx_token.consume(tx_len, |mut tx_buffer| {
  1037. #[cfg(feature = "medium-ethernet")]
  1038. if matches!(self.caps.medium, Medium::Ethernet) {
  1039. emit_ethernet(&ip_repr, tx_buffer)?;
  1040. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1041. }
  1042. // Change the offset for the next packet.
  1043. frag.ipv4.frag_offset = (first_frag_ip_len - ip_header_len) as u16;
  1044. // Copy the IP header and the payload.
  1045. tx_buffer[..first_frag_ip_len]
  1046. .copy_from_slice(&frag.buffer[..first_frag_ip_len]);
  1047. Ok(())
  1048. })
  1049. }
  1050. #[cfg(not(feature = "proto-ipv4-fragmentation"))]
  1051. {
  1052. net_debug!("Enable the `proto-ipv4-fragmentation` feature for fragmentation support.");
  1053. Ok(())
  1054. }
  1055. } else {
  1056. tx_token.set_meta(meta);
  1057. // No fragmentation is required.
  1058. tx_token.consume(total_len, |mut tx_buffer| {
  1059. #[cfg(feature = "medium-ethernet")]
  1060. if matches!(self.caps.medium, Medium::Ethernet) {
  1061. emit_ethernet(&ip_repr, tx_buffer)?;
  1062. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1063. }
  1064. emit_ip(&ip_repr, tx_buffer);
  1065. Ok(())
  1066. })
  1067. }
  1068. }
  1069. // We don't support IPv6 fragmentation yet.
  1070. #[cfg(feature = "proto-ipv6")]
  1071. IpRepr::Ipv6(_) => tx_token.consume(total_len, |mut tx_buffer| {
  1072. #[cfg(feature = "medium-ethernet")]
  1073. if matches!(self.caps.medium, Medium::Ethernet) {
  1074. emit_ethernet(&ip_repr, tx_buffer)?;
  1075. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  1076. }
  1077. emit_ip(&ip_repr, tx_buffer);
  1078. Ok(())
  1079. }),
  1080. }
  1081. }
  1082. }
  1083. #[derive(Debug, Clone, Copy, PartialEq, Eq)]
  1084. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  1085. enum DispatchError {
  1086. /// No route to dispatch this packet. Retrying won't help unless
  1087. /// configuration is changed.
  1088. NoRoute,
  1089. /// We do have a route to dispatch this packet, but we haven't discovered
  1090. /// the neighbor for it yet. Discovery has been initiated, dispatch
  1091. /// should be retried later.
  1092. NeighborPending,
  1093. }