2020-01-18 09:38:21 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
2021-04-22 01:24:48 -07:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-01-18 09:38:21 +01:00
|
|
|
*/
|
|
|
|
|
2020-08-24 19:35:19 -06:00
|
|
|
#include <AK/Singleton.h>
|
2019-04-03 12:36:40 +02:00
|
|
|
#include <Kernel/Devices/RandomDevice.h>
|
2019-06-07 11:43:58 +02:00
|
|
|
#include <Kernel/Net/NetworkAdapter.h>
|
2019-04-02 15:46:44 +02:00
|
|
|
#include <Kernel/Net/Routing.h>
|
2019-06-07 11:43:58 +02:00
|
|
|
#include <Kernel/Net/UDP.h>
|
|
|
|
#include <Kernel/Net/UDPSocket.h>
|
|
|
|
#include <Kernel/Process.h>
|
2020-01-03 12:36:30 +01:00
|
|
|
#include <Kernel/Random.h>
|
2019-03-14 12:43:18 +01:00
|
|
|
|
2020-02-16 01:27:42 +01:00
|
|
|
namespace Kernel {
|
|
|
|
|
2020-04-18 12:50:35 +03:00
|
|
|
void UDPSocket::for_each(Function<void(const UDPSocket&)> callback)
|
2019-08-09 13:27:40 +03:00
|
|
|
{
|
2021-07-18 12:24:34 +02:00
|
|
|
sockets_by_port().for_each_shared([&](const auto& socket) {
|
|
|
|
callback(*socket.value);
|
|
|
|
});
|
2019-08-09 13:27:40 +03:00
|
|
|
}
|
|
|
|
|
2021-08-21 23:31:15 +02:00
|
|
|
static Singleton<MutexProtected<HashMap<u16, UDPSocket*>>> s_map;
|
2020-08-24 19:35:19 -06:00
|
|
|
|
2021-08-21 23:31:15 +02:00
|
|
|
MutexProtected<HashMap<u16, UDPSocket*>>& UDPSocket::sockets_by_port()
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
|
|
|
return *s_map;
|
|
|
|
}
|
|
|
|
|
2019-08-09 09:16:12 +02:00
|
|
|
SocketHandle<UDPSocket> UDPSocket::from_port(u16 port)
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
2021-07-18 12:24:34 +02:00
|
|
|
return sockets_by_port().with_shared([&](const auto& table) -> SocketHandle<UDPSocket> {
|
|
|
|
RefPtr<UDPSocket> socket;
|
|
|
|
auto it = table.find(port);
|
|
|
|
if (it == table.end())
|
2019-06-07 11:43:58 +02:00
|
|
|
return {};
|
2019-03-14 12:43:18 +01:00
|
|
|
socket = (*it).value;
|
2021-02-23 20:42:32 +01:00
|
|
|
VERIFY(socket);
|
2021-07-18 12:24:34 +02:00
|
|
|
return { *socket };
|
|
|
|
});
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
|
|
|
|
2021-08-01 02:42:03 -07:00
|
|
|
UDPSocket::UDPSocket(int protocol, NonnullOwnPtr<DoubleBuffer> receive_buffer)
|
2021-08-01 05:11:05 -07:00
|
|
|
: IPv4Socket(SOCK_DGRAM, protocol, move(receive_buffer), {})
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
UDPSocket::~UDPSocket()
|
|
|
|
{
|
2021-07-18 12:24:34 +02:00
|
|
|
sockets_by_port().with_exclusive([&](auto& table) {
|
|
|
|
table.remove(local_port());
|
|
|
|
});
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<NonnullRefPtr<UDPSocket>> UDPSocket::try_create(int protocol, NonnullOwnPtr<DoubleBuffer> receive_buffer)
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
2021-09-04 23:04:06 +02:00
|
|
|
return adopt_nonnull_ref_or_enomem(new (nothrow) UDPSocket(protocol, move(receive_buffer)));
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<size_t> UDPSocket::protocol_receive(ReadonlyBytes raw_ipv4_packet, UserOrKernelBuffer& buffer, size_t buffer_size, [[maybe_unused]] int flags)
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
2020-12-18 16:13:23 +01:00
|
|
|
auto& ipv4_packet = *(const IPv4Packet*)(raw_ipv4_packet.data());
|
2019-03-14 12:43:18 +01:00
|
|
|
auto& udp_packet = *static_cast<const UDPPacket*>(ipv4_packet.payload());
|
2021-02-23 20:42:32 +01:00
|
|
|
VERIFY(udp_packet.length() >= sizeof(UDPPacket)); // FIXME: This should be rejected earlier.
|
2021-05-06 08:27:51 +02:00
|
|
|
size_t read_size = min(buffer_size, udp_packet.length() - sizeof(UDPPacket));
|
2021-09-07 15:05:51 +02:00
|
|
|
SOCKET_TRY(buffer.write(udp_packet.payload(), read_size));
|
2021-05-06 08:27:51 +02:00
|
|
|
return read_size;
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<size_t> UDPSocket::protocol_send(const UserOrKernelBuffer& data, size_t data_length)
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
2020-04-05 01:16:45 +04:30
|
|
|
auto routing_decision = route_to(peer_address(), local_address(), bound_interface());
|
2019-08-29 11:18:38 +10:00
|
|
|
if (routing_decision.is_zero())
|
2021-08-01 11:27:23 -04:00
|
|
|
return set_so_error(EHOSTUNREACH);
|
2021-05-26 05:35:05 +02:00
|
|
|
auto ipv4_payload_offset = routing_decision.adapter->ipv4_payload_offset();
|
|
|
|
data_length = min(data_length, routing_decision.adapter->mtu() - ipv4_payload_offset - sizeof(UDPPacket));
|
|
|
|
const size_t udp_buffer_size = sizeof(UDPPacket) + data_length;
|
|
|
|
auto packet = routing_decision.adapter->acquire_packet_buffer(ipv4_payload_offset + udp_buffer_size);
|
|
|
|
if (!packet)
|
2021-08-01 11:27:23 -04:00
|
|
|
return set_so_error(ENOMEM);
|
2021-08-01 05:11:49 -07:00
|
|
|
memset(packet->buffer->data() + ipv4_payload_offset, 0, sizeof(UDPPacket));
|
|
|
|
auto& udp_packet = *reinterpret_cast<UDPPacket*>(packet->buffer->data() + ipv4_payload_offset);
|
2019-05-04 16:40:34 +02:00
|
|
|
udp_packet.set_source_port(local_port());
|
|
|
|
udp_packet.set_destination_port(peer_port());
|
2021-05-26 05:35:05 +02:00
|
|
|
udp_packet.set_length(udp_buffer_size);
|
2021-09-07 15:05:51 +02:00
|
|
|
SOCKET_TRY(data.read(udp_packet.payload(), data_length));
|
2021-05-26 05:35:05 +02:00
|
|
|
routing_decision.adapter->fill_in_ipv4_header(*packet, local_address(), routing_decision.next_hop,
|
2021-10-27 23:20:24 +03:00
|
|
|
peer_address(), IPv4Protocol::UDP, udp_buffer_size, type_of_service(), ttl());
|
2021-08-01 05:11:49 -07:00
|
|
|
routing_decision.adapter->send_packet(packet->bytes());
|
2019-03-14 12:43:18 +01:00
|
|
|
return data_length;
|
|
|
|
}
|
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<void> UDPSocket::protocol_connect(OpenFileDescription&, ShouldBlock)
|
2019-08-11 16:38:20 +03:00
|
|
|
{
|
2021-08-29 02:04:30 +02:00
|
|
|
set_role(Role::Connected);
|
2020-01-26 14:43:08 +01:00
|
|
|
set_connected(true);
|
2021-11-08 00:51:39 +01:00
|
|
|
return {};
|
2019-08-11 16:38:20 +03:00
|
|
|
}
|
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<u16> UDPSocket::protocol_allocate_local_port()
|
2019-03-14 12:43:18 +01:00
|
|
|
{
|
2021-05-19 08:35:09 -06:00
|
|
|
constexpr u16 first_ephemeral_port = 32768;
|
|
|
|
constexpr u16 last_ephemeral_port = 60999;
|
|
|
|
constexpr u16 ephemeral_port_range_size = last_ephemeral_port - first_ephemeral_port;
|
2020-01-03 12:36:30 +01:00
|
|
|
u16 first_scan_port = first_ephemeral_port + get_good_random<u16>() % ephemeral_port_range_size;
|
2019-03-18 04:03:44 +01:00
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
return sockets_by_port().with_exclusive([&](auto& table) -> ErrorOr<u16> {
|
2021-07-18 12:24:34 +02:00
|
|
|
for (u16 port = first_scan_port;;) {
|
|
|
|
auto it = table.find(port);
|
|
|
|
if (it == table.end()) {
|
|
|
|
set_local_port(port);
|
|
|
|
table.set(port, this);
|
|
|
|
return port;
|
|
|
|
}
|
|
|
|
++port;
|
|
|
|
if (port > last_ephemeral_port)
|
|
|
|
port = first_ephemeral_port;
|
|
|
|
if (port == first_scan_port)
|
|
|
|
break;
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
2021-08-01 11:27:23 -04:00
|
|
|
return set_so_error(EADDRINUSE);
|
2021-07-18 12:24:34 +02:00
|
|
|
});
|
2019-03-14 12:43:18 +01:00
|
|
|
}
|
2019-05-03 21:51:40 +02:00
|
|
|
|
2021-11-08 00:51:39 +01:00
|
|
|
ErrorOr<void> UDPSocket::protocol_bind()
|
2019-05-03 21:51:40 +02:00
|
|
|
{
|
2021-11-08 00:51:39 +01:00
|
|
|
return sockets_by_port().with_exclusive([&](auto& table) -> ErrorOr<void> {
|
2021-07-18 12:24:34 +02:00
|
|
|
if (table.contains(local_port()))
|
2021-08-01 11:27:23 -04:00
|
|
|
return set_so_error(EADDRINUSE);
|
2021-07-18 12:24:34 +02:00
|
|
|
table.set(local_port(), this);
|
2021-11-08 00:51:39 +01:00
|
|
|
return {};
|
2021-07-18 12:24:34 +02:00
|
|
|
});
|
2019-05-03 21:51:40 +02:00
|
|
|
}
|
2020-02-16 01:27:42 +01:00
|
|
|
|
|
|
|
}
|