ethernet.rs 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. use managed::{Managed, ManagedSlice};
  2. use Error;
  3. use phy::Device;
  4. use wire::{EthernetAddress, EthernetProtocol, EthernetFrame};
  5. use wire::{ArpPacket, ArpRepr, ArpOperation};
  6. use wire::{Ipv4Packet, Ipv4Repr};
  7. use wire::{Icmpv4Packet, Icmpv4Repr, Icmpv4DstUnreachable};
  8. use wire::{IpAddress, IpProtocol, IpRepr};
  9. use wire::{TcpPacket, TcpRepr, TcpControl};
  10. use socket::{Socket, SocketSet, RawSocket, TcpSocket, UdpSocket, AsSocket};
  11. use super::ArpCache;
  12. /// An Ethernet network interface.
  13. ///
  14. /// The network interface logically owns a number of other data structures; to avoid
  15. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  16. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  17. pub struct Interface<'a, 'b, 'c, DeviceT: Device + 'a> {
  18. device: Managed<'a, DeviceT>,
  19. arp_cache: Managed<'b, ArpCache>,
  20. hardware_addr: EthernetAddress,
  21. protocol_addrs: ManagedSlice<'c, IpAddress>,
  22. }
  23. enum Response<'a> {
  24. Nop,
  25. Arp(ArpRepr),
  26. Icmpv4(Ipv4Repr, Icmpv4Repr<'a>),
  27. Tcpv4(Ipv4Repr, TcpRepr<'a>)
  28. }
  29. impl<'a, 'b, 'c, DeviceT: Device + 'a> Interface<'a, 'b, 'c, DeviceT> {
  30. /// Create a network interface using the provided network device.
  31. ///
  32. /// # Panics
  33. /// See the restrictions on [set_hardware_addr](#method.set_hardware_addr)
  34. /// and [set_protocol_addrs](#method.set_protocol_addrs) functions.
  35. pub fn new<DeviceMT, ArpCacheMT, ProtocolAddrsMT>
  36. (device: DeviceMT, arp_cache: ArpCacheMT,
  37. hardware_addr: EthernetAddress, protocol_addrs: ProtocolAddrsMT) ->
  38. Interface<'a, 'b, 'c, DeviceT>
  39. where DeviceMT: Into<Managed<'a, DeviceT>>,
  40. ArpCacheMT: Into<Managed<'b, ArpCache>>,
  41. ProtocolAddrsMT: Into<ManagedSlice<'c, IpAddress>>, {
  42. let device = device.into();
  43. let arp_cache = arp_cache.into();
  44. let protocol_addrs = protocol_addrs.into();
  45. Self::check_hardware_addr(&hardware_addr);
  46. Self::check_protocol_addrs(&protocol_addrs);
  47. Interface {
  48. device: device,
  49. arp_cache: arp_cache,
  50. hardware_addr: hardware_addr,
  51. protocol_addrs: protocol_addrs,
  52. }
  53. }
  54. fn check_hardware_addr(addr: &EthernetAddress) {
  55. if addr.is_multicast() {
  56. panic!("hardware address {} is not unicast", addr)
  57. }
  58. }
  59. /// Get the hardware address of the interface.
  60. pub fn hardware_addr(&self) -> EthernetAddress {
  61. self.hardware_addr
  62. }
  63. /// Set the hardware address of the interface.
  64. ///
  65. /// # Panics
  66. /// This function panics if the address is not unicast.
  67. pub fn set_hardware_addr(&mut self, addr: EthernetAddress) {
  68. self.hardware_addr = addr;
  69. Self::check_hardware_addr(&self.hardware_addr);
  70. }
  71. fn check_protocol_addrs(addrs: &[IpAddress]) {
  72. for addr in addrs {
  73. if !addr.is_unicast() {
  74. panic!("protocol address {} is not unicast", addr)
  75. }
  76. }
  77. }
  78. /// Get the protocol addresses of the interface.
  79. pub fn protocol_addrs(&self) -> &[IpAddress] {
  80. self.protocol_addrs.as_ref()
  81. }
  82. /// Update the protocol addresses of the interface.
  83. ///
  84. /// # Panics
  85. /// This function panics if any of the addresses is not unicast.
  86. pub fn update_protocol_addrs<F: FnOnce(&mut ManagedSlice<'c, IpAddress>)>(&mut self, f: F) {
  87. f(&mut self.protocol_addrs);
  88. Self::check_protocol_addrs(&self.protocol_addrs)
  89. }
  90. /// Check whether the interface has the given protocol address assigned.
  91. pub fn has_protocol_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  92. let addr = addr.into();
  93. self.protocol_addrs.iter().any(|&probe| probe == addr)
  94. }
  95. /// Receive and process a packet, if available, and then transmit a packet, if necessary,
  96. /// handling the given set of sockets.
  97. ///
  98. /// The timestamp is a monotonically increasing number of milliseconds.
  99. pub fn poll(&mut self, sockets: &mut SocketSet, timestamp: u64) -> Result<(), Error> {
  100. // First, transmit any outgoing packets.
  101. loop {
  102. if self.emit(sockets, timestamp)? { break }
  103. }
  104. // Now, receive any incoming packets.
  105. let rx_buffer = self.device.receive()?;
  106. let eth_frame = EthernetFrame::new_checked(&rx_buffer)?;
  107. // Ignore any packets not directed to our hardware address.
  108. if !eth_frame.dst_addr().is_broadcast() &&
  109. eth_frame.dst_addr() != self.hardware_addr {
  110. return Ok(())
  111. }
  112. let response = match eth_frame.ethertype() {
  113. EthernetProtocol::Arp =>
  114. self.process_arp(&eth_frame)?,
  115. EthernetProtocol::Ipv4 =>
  116. self.process_ipv4(sockets, timestamp, &eth_frame)?,
  117. // Drop all other traffic.
  118. _ => return Err(Error::Unrecognized),
  119. };
  120. self.send_response(response)
  121. }
  122. // Snoop all ARP traffic, and respond to ARP packets directed at us.
  123. fn process_arp<'frame, T: AsRef<[u8]>>
  124. (&mut self, eth_frame: &EthernetFrame<&'frame T>) ->
  125. Result<Response<'frame>, Error> {
  126. let arp_packet = ArpPacket::new_checked(eth_frame.payload())?;
  127. let arp_repr = ArpRepr::parse(&arp_packet)?;
  128. match arp_repr {
  129. // Respond to ARP requests aimed at us, and fill the ARP cache
  130. // from all ARP requests, including gratuitous.
  131. ArpRepr::EthernetIpv4 {
  132. operation: ArpOperation::Request,
  133. source_hardware_addr, source_protocol_addr,
  134. target_protocol_addr, ..
  135. } => {
  136. if source_protocol_addr.is_unicast() && source_hardware_addr.is_unicast() {
  137. self.arp_cache.fill(&source_protocol_addr.into(),
  138. &source_hardware_addr);
  139. }
  140. if self.has_protocol_addr(target_protocol_addr) {
  141. Ok(Response::Arp(ArpRepr::EthernetIpv4 {
  142. operation: ArpOperation::Reply,
  143. source_hardware_addr: self.hardware_addr,
  144. source_protocol_addr: target_protocol_addr,
  145. target_hardware_addr: source_hardware_addr,
  146. target_protocol_addr: source_protocol_addr
  147. }))
  148. } else {
  149. Ok(Response::Nop)
  150. }
  151. }
  152. // Fill the ARP cache from gratuitous ARP replies.
  153. ArpRepr::EthernetIpv4 {
  154. operation: ArpOperation::Reply,
  155. source_hardware_addr, source_protocol_addr, ..
  156. } => {
  157. if source_protocol_addr.is_unicast() && source_hardware_addr.is_unicast() {
  158. self.arp_cache.fill(&source_protocol_addr.into(),
  159. &source_hardware_addr);
  160. }
  161. Ok(Response::Nop)
  162. }
  163. _ => Err(Error::Unrecognized)
  164. }
  165. }
  166. fn process_ipv4<'frame, T: AsRef<[u8]>>
  167. (&mut self, sockets: &mut SocketSet, timestamp: u64,
  168. eth_frame: &EthernetFrame<&'frame T>) ->
  169. Result<Response<'frame>, Error> {
  170. let ipv4_packet = Ipv4Packet::new_checked(eth_frame.payload())?;
  171. let ipv4_repr = Ipv4Repr::parse(&ipv4_packet)?;
  172. if ipv4_repr.src_addr.is_unicast() && eth_frame.src_addr().is_unicast() {
  173. // Fill the ARP cache from IP header of unicast frames.
  174. self.arp_cache.fill(&IpAddress::Ipv4(ipv4_repr.src_addr),
  175. &eth_frame.src_addr());
  176. }
  177. // Pass every IP packet to all raw sockets we have registered.
  178. let mut handled_by_raw_socket = false;
  179. for raw_socket in sockets.iter_mut().filter_map(
  180. <Socket as AsSocket<RawSocket>>::try_as_socket) {
  181. match raw_socket.process(timestamp, &IpRepr::Ipv4(ipv4_repr),
  182. ipv4_packet.payload()) {
  183. Ok(()) => handled_by_raw_socket = true,
  184. Err(Error::Rejected) => (),
  185. _ => unreachable!(),
  186. }
  187. }
  188. if !self.has_protocol_addr(ipv4_repr.dst_addr) {
  189. // Ignore IP packets not directed at us.
  190. return Ok(Response::Nop)
  191. }
  192. match ipv4_repr.protocol {
  193. IpProtocol::Icmp =>
  194. Self::process_icmpv4(ipv4_repr, ipv4_packet.payload()),
  195. IpProtocol::Tcp =>
  196. Self::process_tcpv4(sockets, timestamp, ipv4_repr, ipv4_packet.payload()),
  197. IpProtocol::Udp =>
  198. Self::process_udpv4(sockets, timestamp, ipv4_repr, ipv4_packet.payload()),
  199. _ => {
  200. if handled_by_raw_socket {
  201. Ok(Response::Nop)
  202. } else {
  203. let icmp_reply_repr = Icmpv4Repr::DstUnreachable {
  204. reason: Icmpv4DstUnreachable::PortUnreachable,
  205. header: ipv4_repr,
  206. data: &ipv4_packet.payload()[0..8]
  207. };
  208. let ipv4_reply_repr = Ipv4Repr {
  209. src_addr: ipv4_repr.dst_addr,
  210. dst_addr: ipv4_repr.src_addr,
  211. protocol: IpProtocol::Icmp,
  212. payload_len: icmp_reply_repr.buffer_len()
  213. };
  214. Ok(Response::Icmpv4(ipv4_reply_repr, icmp_reply_repr))
  215. }
  216. }
  217. }
  218. }
  219. fn process_icmpv4<'frame>(ipv4_repr: Ipv4Repr, ip_payload: &'frame [u8]) ->
  220. Result<Response<'frame>, Error> {
  221. let icmp_packet = Icmpv4Packet::new_checked(ip_payload)?;
  222. let icmp_repr = Icmpv4Repr::parse(&icmp_packet)?;
  223. match icmp_repr {
  224. // Respond to echo requests.
  225. Icmpv4Repr::EchoRequest {
  226. ident, seq_no, data
  227. } => {
  228. let icmp_reply_repr = Icmpv4Repr::EchoReply {
  229. ident: ident,
  230. seq_no: seq_no,
  231. data: data
  232. };
  233. let ipv4_reply_repr = Ipv4Repr {
  234. src_addr: ipv4_repr.dst_addr,
  235. dst_addr: ipv4_repr.src_addr,
  236. protocol: IpProtocol::Icmp,
  237. payload_len: icmp_reply_repr.buffer_len()
  238. };
  239. Ok(Response::Icmpv4(ipv4_reply_repr, icmp_reply_repr))
  240. }
  241. // Ignore any echo replies.
  242. Icmpv4Repr::EchoReply { .. } => Ok(Response::Nop),
  243. // FIXME: do something correct here?
  244. _ => Err(Error::Unrecognized),
  245. }
  246. }
  247. fn process_tcpv4<'frame>(sockets: &mut SocketSet, timestamp: u64,
  248. ipv4_repr: Ipv4Repr, ip_payload: &'frame [u8]) ->
  249. Result<Response<'frame>, Error> {
  250. let ip_repr = IpRepr::Ipv4(ipv4_repr);
  251. for tcp_socket in sockets.iter_mut().filter_map(
  252. <Socket as AsSocket<TcpSocket>>::try_as_socket) {
  253. match tcp_socket.process(timestamp, &ip_repr, ip_payload) {
  254. // The packet was valid and handled by socket.
  255. Ok(()) => return Ok(Response::Nop),
  256. // The packet wasn't addressed to the socket.
  257. // Send RST only if no other socket accepts the packet.
  258. Err(Error::Rejected) => continue,
  259. // The packet was addressed to the socket but is malformed.
  260. Err(Error::Malformed) => break,
  261. Err(e) => return Err(e)
  262. }
  263. }
  264. // The packet wasn't handled by a socket, send a TCP RST packet.
  265. let tcp_packet = TcpPacket::new_checked(ip_payload)?;
  266. let tcp_reply_repr = TcpRepr {
  267. src_port: tcp_packet.dst_port(),
  268. dst_port: tcp_packet.src_port(),
  269. control: TcpControl::Rst,
  270. push: false,
  271. seq_number: tcp_packet.ack_number(),
  272. ack_number: Some(tcp_packet.seq_number() +
  273. tcp_packet.segment_len()),
  274. window_len: 0,
  275. max_seg_size: None,
  276. payload: &[]
  277. };
  278. let ipv4_reply_repr = Ipv4Repr {
  279. src_addr: ipv4_repr.dst_addr,
  280. dst_addr: ipv4_repr.src_addr,
  281. protocol: IpProtocol::Tcp,
  282. payload_len: tcp_reply_repr.buffer_len()
  283. };
  284. Ok(Response::Tcpv4(ipv4_reply_repr, tcp_reply_repr))
  285. }
  286. fn process_udpv4<'frame>(sockets: &mut SocketSet, timestamp: u64,
  287. ipv4_repr: Ipv4Repr, ip_payload: &'frame [u8]) ->
  288. Result<Response<'frame>, Error> {
  289. let ip_repr = IpRepr::Ipv4(ipv4_repr);
  290. for udp_socket in sockets.iter_mut().filter_map(
  291. <Socket as AsSocket<UdpSocket>>::try_as_socket) {
  292. match udp_socket.process(timestamp, &ip_repr, ip_payload) {
  293. // The packet was valid and handled by socket.
  294. Ok(()) => return Ok(Response::Nop),
  295. // The packet wasn't addressed to the socket.
  296. Err(Error::Rejected) => continue,
  297. // The packet was addressed to the socket but is malformed.
  298. Err(Error::Malformed) => break,
  299. Err(e) => return Err(e)
  300. }
  301. }
  302. //The packet wasn't handled by a socket, send an ICMP port unreachable packet.
  303. let icmp_reply_repr = Icmpv4Repr::DstUnreachable {
  304. reason: Icmpv4DstUnreachable::PortUnreachable,
  305. header: ipv4_repr,
  306. data: &ip_payload[0..8]
  307. };
  308. let ipv4_reply_repr = Ipv4Repr {
  309. src_addr: ipv4_repr.dst_addr,
  310. dst_addr: ipv4_repr.src_addr,
  311. protocol: IpProtocol::Icmp,
  312. payload_len: icmp_reply_repr.buffer_len()
  313. };
  314. Ok(Response::Icmpv4(ipv4_reply_repr, icmp_reply_repr))
  315. }
  316. fn send_response(&mut self, response: Response) -> Result<(), Error> {
  317. macro_rules! ip_response {
  318. ($tx_buffer:ident, $frame:ident, $ip_repr:ident) => ({
  319. let dst_hardware_addr =
  320. match self.arp_cache.lookup(&$ip_repr.dst_addr.into()) {
  321. None => return Err(Error::Unaddressable),
  322. Some(hardware_addr) => hardware_addr
  323. };
  324. let frame_len = EthernetFrame::<&[u8]>::buffer_len($ip_repr.buffer_len() +
  325. $ip_repr.payload_len);
  326. $tx_buffer = self.device.transmit(frame_len)?;
  327. $frame = EthernetFrame::new_checked(&mut $tx_buffer)
  328. .expect("transmit frame too small");
  329. $frame.set_src_addr(self.hardware_addr);
  330. $frame.set_dst_addr(dst_hardware_addr);
  331. $frame.set_ethertype(EthernetProtocol::Ipv4);
  332. let mut ip_packet = Ipv4Packet::new($frame.payload_mut());
  333. $ip_repr.emit(&mut ip_packet);
  334. ip_packet
  335. })
  336. }
  337. match response {
  338. Response::Arp(repr) => {
  339. let tx_len = EthernetFrame::<&[u8]>::buffer_len(repr.buffer_len());
  340. let mut tx_buffer = self.device.transmit(tx_len)?;
  341. let mut frame = EthernetFrame::new_checked(&mut tx_buffer)
  342. .expect("transmit frame too small");
  343. frame.set_src_addr(self.hardware_addr);
  344. frame.set_dst_addr(match repr {
  345. ArpRepr::EthernetIpv4 { target_hardware_addr, .. } => target_hardware_addr,
  346. _ => unreachable!()
  347. });
  348. frame.set_ethertype(EthernetProtocol::Arp);
  349. let mut packet = ArpPacket::new(frame.payload_mut());
  350. repr.emit(&mut packet);
  351. Ok(())
  352. },
  353. Response::Icmpv4(ip_repr, icmp_repr) => {
  354. let mut tx_buffer;
  355. let mut frame;
  356. let mut ip_packet = ip_response!(tx_buffer, frame, ip_repr);
  357. let mut icmp_packet = Icmpv4Packet::new(ip_packet.payload_mut());
  358. icmp_repr.emit(&mut icmp_packet);
  359. Ok(())
  360. }
  361. Response::Tcpv4(ip_repr, tcp_repr) => {
  362. let mut tx_buffer;
  363. let mut frame;
  364. let mut ip_packet = ip_response!(tx_buffer, frame, ip_repr);
  365. let mut tcp_packet = TcpPacket::new(ip_packet.payload_mut());
  366. tcp_repr.emit(&mut tcp_packet,
  367. &IpAddress::Ipv4(ip_repr.src_addr),
  368. &IpAddress::Ipv4(ip_repr.dst_addr));
  369. Ok(())
  370. }
  371. Response::Nop => {
  372. Ok(())
  373. }
  374. }
  375. }
  376. fn emit(&mut self, sockets: &mut SocketSet, timestamp: u64) -> Result<bool, Error> {
  377. // Borrow checker is being overly careful around closures, so we have
  378. // to hack around that.
  379. let src_hardware_addr = self.hardware_addr;
  380. let src_protocol_addrs = self.protocol_addrs.as_ref();
  381. let arp_cache = &mut self.arp_cache;
  382. let device = &mut self.device;
  383. let mut limits = device.limits();
  384. limits.max_transmission_unit -= EthernetFrame::<&[u8]>::header_len();
  385. let mut nothing_to_transmit = true;
  386. for socket in sockets.iter_mut() {
  387. let result = socket.dispatch(timestamp, &limits, &mut |repr, payload| {
  388. let repr = repr.lower(src_protocol_addrs)?;
  389. match arp_cache.lookup(&repr.dst_addr()) {
  390. Some(dst_hardware_addr) => {
  391. let tx_len = EthernetFrame::<&[u8]>::buffer_len(repr.buffer_len() +
  392. payload.buffer_len());
  393. let mut tx_buffer = device.transmit(tx_len)?;
  394. let mut frame = EthernetFrame::new_checked(&mut tx_buffer)
  395. .expect("transmit frame too small");
  396. frame.set_src_addr(src_hardware_addr);
  397. frame.set_dst_addr(dst_hardware_addr);
  398. frame.set_ethertype(EthernetProtocol::Ipv4);
  399. repr.emit(frame.payload_mut());
  400. let mut ip_packet = Ipv4Packet::new(frame.payload_mut());
  401. payload.emit(&repr, ip_packet.payload_mut());
  402. }
  403. None => {
  404. let (src_addr, dst_addr) =
  405. match (repr.src_addr(), repr.dst_addr()) {
  406. (IpAddress::Ipv4(src_addr), IpAddress::Ipv4(dst_addr)) =>
  407. (src_addr, dst_addr),
  408. // We've lowered all addresses to a concrete form.
  409. _ => unreachable!()
  410. };
  411. let payload = ArpRepr::EthernetIpv4 {
  412. operation: ArpOperation::Request,
  413. source_hardware_addr: src_hardware_addr,
  414. source_protocol_addr: src_addr,
  415. target_hardware_addr: EthernetAddress::default(),
  416. target_protocol_addr: dst_addr,
  417. };
  418. let tx_len = EthernetFrame::<&[u8]>::buffer_len(payload.buffer_len());
  419. let mut tx_buffer = device.transmit(tx_len)?;
  420. let mut frame = EthernetFrame::new_checked(&mut tx_buffer)
  421. .expect("transmit frame too small");
  422. frame.set_src_addr(src_hardware_addr);
  423. frame.set_dst_addr(EthernetAddress([0xff; 6]));
  424. frame.set_ethertype(EthernetProtocol::Arp);
  425. let mut arp_packet = ArpPacket::new(frame.payload_mut());
  426. payload.emit(&mut arp_packet);
  427. }
  428. }
  429. Ok(())
  430. });
  431. match result {
  432. Ok(()) => {
  433. nothing_to_transmit = false;
  434. break
  435. }
  436. Err(Error::Exhausted) => continue,
  437. Err(e) => return Err(e)
  438. }
  439. }
  440. Ok(nothing_to_transmit)
  441. }
  442. }