IPv4Socket.cpp 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252
  1. #include <Kernel/FileSystem/FileDescription.h>
  2. #include <Kernel/Net/ARP.h>
  3. #include <Kernel/Net/ICMP.h>
  4. #include <Kernel/Net/IPv4.h>
  5. #include <Kernel/Net/IPv4Socket.h>
  6. #include <Kernel/Net/NetworkAdapter.h>
  7. #include <Kernel/Net/Routing.h>
  8. #include <Kernel/Net/TCP.h>
  9. #include <Kernel/Net/TCPSocket.h>
  10. #include <Kernel/Net/UDP.h>
  11. #include <Kernel/Net/UDPSocket.h>
  12. #include <Kernel/Process.h>
  13. #include <Kernel/UnixTypes.h>
  14. #include <LibC/errno_numbers.h>
  15. //#define IPV4_SOCKET_DEBUG
  16. Lockable<HashTable<IPv4Socket*>>& IPv4Socket::all_sockets()
  17. {
  18. static Lockable<HashTable<IPv4Socket*>>* s_table;
  19. if (!s_table)
  20. s_table = new Lockable<HashTable<IPv4Socket*>>;
  21. return *s_table;
  22. }
  23. NonnullRefPtr<IPv4Socket> IPv4Socket::create(int type, int protocol)
  24. {
  25. if (type == SOCK_STREAM)
  26. return TCPSocket::create(protocol);
  27. if (type == SOCK_DGRAM)
  28. return UDPSocket::create(protocol);
  29. return adopt(*new IPv4Socket(type, protocol));
  30. }
  31. IPv4Socket::IPv4Socket(int type, int protocol)
  32. : Socket(AF_INET, type, protocol)
  33. {
  34. kprintf("%s(%u) IPv4Socket{%p} created with type=%u, protocol=%d\n", current->process().name().characters(), current->pid(), this, type, protocol);
  35. LOCKER(all_sockets().lock());
  36. all_sockets().resource().set(this);
  37. }
  38. IPv4Socket::~IPv4Socket()
  39. {
  40. LOCKER(all_sockets().lock());
  41. all_sockets().resource().remove(this);
  42. }
  43. bool IPv4Socket::get_local_address(sockaddr* address, socklen_t* address_size)
  44. {
  45. // FIXME: Look into what fallback behavior we should have here.
  46. if (*address_size < sizeof(sockaddr_in))
  47. return false;
  48. auto& ia = (sockaddr_in&)*address;
  49. ia.sin_family = AF_INET;
  50. ia.sin_port = m_local_port;
  51. memcpy(&ia.sin_addr, &m_local_address, sizeof(IPv4Address));
  52. *address_size = sizeof(sockaddr_in);
  53. return true;
  54. }
  55. bool IPv4Socket::get_peer_address(sockaddr* address, socklen_t* address_size)
  56. {
  57. // FIXME: Look into what fallback behavior we should have here.
  58. if (*address_size < sizeof(sockaddr_in))
  59. return false;
  60. auto& ia = (sockaddr_in&)*address;
  61. ia.sin_family = AF_INET;
  62. ia.sin_port = m_peer_port;
  63. memcpy(&ia.sin_addr, &m_peer_address, sizeof(IPv4Address));
  64. *address_size = sizeof(sockaddr_in);
  65. return true;
  66. }
  67. KResult IPv4Socket::bind(const sockaddr* address, socklen_t address_size)
  68. {
  69. ASSERT(!is_connected());
  70. if (address_size != sizeof(sockaddr_in))
  71. return KResult(-EINVAL);
  72. if (address->sa_family != AF_INET)
  73. return KResult(-EINVAL);
  74. auto& ia = *(const sockaddr_in*)address;
  75. m_local_address = IPv4Address((const u8*)&ia.sin_addr.s_addr);
  76. m_local_port = ntohs(ia.sin_port);
  77. dbgprintf("IPv4Socket::bind %s{%p} to port %u\n", class_name(), this, m_local_port);
  78. return protocol_bind();
  79. }
  80. KResult IPv4Socket::connect(FileDescription& description, const sockaddr* address, socklen_t address_size, ShouldBlock should_block)
  81. {
  82. if (address_size != sizeof(sockaddr_in))
  83. return KResult(-EINVAL);
  84. if (address->sa_family != AF_INET)
  85. return KResult(-EINVAL);
  86. auto& ia = *(const sockaddr_in*)address;
  87. m_peer_address = IPv4Address((const u8*)&ia.sin_addr.s_addr);
  88. m_peer_port = ntohs(ia.sin_port);
  89. return protocol_connect(description, should_block);
  90. }
  91. void IPv4Socket::attach(FileDescription&)
  92. {
  93. }
  94. void IPv4Socket::detach(FileDescription&)
  95. {
  96. }
  97. bool IPv4Socket::can_read(FileDescription& description) const
  98. {
  99. if (description.socket_role() == SocketRole::Listener)
  100. return can_accept();
  101. if (protocol_is_disconnected())
  102. return true;
  103. return m_can_read;
  104. }
  105. bool IPv4Socket::can_write(FileDescription&) const
  106. {
  107. return is_connected();
  108. }
  109. int IPv4Socket::allocate_local_port_if_needed()
  110. {
  111. if (m_local_port)
  112. return m_local_port;
  113. int port = protocol_allocate_local_port();
  114. if (port < 0)
  115. return port;
  116. m_local_port = (u16)port;
  117. return port;
  118. }
  119. ssize_t IPv4Socket::sendto(FileDescription&, const void* data, size_t data_length, int flags, const sockaddr* addr, socklen_t addr_length)
  120. {
  121. (void)flags;
  122. if (addr && addr_length != sizeof(sockaddr_in))
  123. return -EINVAL;
  124. if (addr) {
  125. if (addr->sa_family != AF_INET) {
  126. kprintf("sendto: Bad address family: %u is not AF_INET!\n", addr->sa_family);
  127. return -EAFNOSUPPORT;
  128. }
  129. auto& ia = *(const sockaddr_in*)addr;
  130. m_peer_address = IPv4Address((const u8*)&ia.sin_addr.s_addr);
  131. m_peer_port = ntohs(ia.sin_port);
  132. }
  133. auto* adapter = adapter_for_route_to(m_peer_address);
  134. if (!adapter)
  135. return -EHOSTUNREACH;
  136. int rc = allocate_local_port_if_needed();
  137. if (rc < 0)
  138. return rc;
  139. kprintf("sendto: destination=%s:%u\n", m_peer_address.to_string().characters(), m_peer_port);
  140. if (type() == SOCK_RAW) {
  141. adapter->send_ipv4(MACAddress(), m_peer_address, (IPv4Protocol)protocol(), ByteBuffer::copy(data, data_length));
  142. return data_length;
  143. }
  144. return protocol_send(data, data_length);
  145. }
  146. ssize_t IPv4Socket::recvfrom(FileDescription& description, void* buffer, size_t buffer_length, int flags, sockaddr* addr, socklen_t* addr_length)
  147. {
  148. (void)flags;
  149. if (addr_length && *addr_length < sizeof(sockaddr_in))
  150. return -EINVAL;
  151. #ifdef IPV4_SOCKET_DEBUG
  152. kprintf("recvfrom: type=%d, local_port=%u\n", type(), local_port());
  153. #endif
  154. ReceivedPacket packet;
  155. {
  156. LOCKER(lock());
  157. if (!m_receive_queue.is_empty()) {
  158. packet = m_receive_queue.take_first();
  159. m_can_read = !m_receive_queue.is_empty();
  160. #ifdef IPV4_SOCKET_DEBUG
  161. kprintf("IPv4Socket(%p): recvfrom without blocking %d bytes, packets in queue: %d\n", this, packet.data.size(), m_receive_queue.size_slow());
  162. #endif
  163. }
  164. }
  165. if (packet.data.is_null()) {
  166. if (protocol_is_disconnected()) {
  167. kprintf("IPv4Socket{%p} is protocol-disconnected, returning 0 in recvfrom!\n", this);
  168. return 0;
  169. }
  170. load_receive_deadline();
  171. auto res = current->block<Thread::ReceiveBlocker>(description);
  172. LOCKER(lock());
  173. if (!m_can_read) {
  174. if (res == Thread::BlockResult::InterruptedBySignal)
  175. return -EINTR;
  176. // Unblocked due to timeout.
  177. return -EAGAIN;
  178. }
  179. ASSERT(m_can_read);
  180. ASSERT(!m_receive_queue.is_empty());
  181. packet = m_receive_queue.take_first();
  182. m_can_read = !m_receive_queue.is_empty();
  183. #ifdef IPV4_SOCKET_DEBUG
  184. kprintf("IPv4Socket(%p): recvfrom with blocking %d bytes, packets in queue: %d\n", this, packet.data.size(), m_receive_queue.size_slow());
  185. #endif
  186. }
  187. ASSERT(!packet.data.is_null());
  188. auto& ipv4_packet = *(const IPv4Packet*)(packet.data->data());
  189. if (addr) {
  190. dbgprintf("Incoming packet is from: %s:%u\n", packet.peer_address.to_string().characters(), packet.peer_port);
  191. auto& ia = *(sockaddr_in*)addr;
  192. memcpy(&ia.sin_addr, &packet.peer_address, sizeof(IPv4Address));
  193. ia.sin_port = htons(packet.peer_port);
  194. ia.sin_family = AF_INET;
  195. ASSERT(addr_length);
  196. *addr_length = sizeof(sockaddr_in);
  197. }
  198. if (type() == SOCK_RAW) {
  199. ASSERT(buffer_length >= ipv4_packet.payload_size());
  200. memcpy(buffer, ipv4_packet.payload(), ipv4_packet.payload_size());
  201. return ipv4_packet.payload_size();
  202. }
  203. return protocol_receive(*packet.data, buffer, buffer_length, flags);
  204. }
  205. void IPv4Socket::did_receive(const IPv4Address& source_address, u16 source_port, NonnullRefPtr<KBuffer>&& packet)
  206. {
  207. LOCKER(lock());
  208. auto packet_size = packet->size();
  209. m_receive_queue.append({ source_address, source_port, move(packet) });
  210. m_can_read = true;
  211. m_bytes_received += packet_size;
  212. #ifdef IPV4_SOCKET_DEBUG
  213. kprintf("IPv4Socket(%p): did_receive %d bytes, total_received=%u, packets in queue: %d\n", this, packet_size, m_bytes_received, m_receive_queue.size_slow());
  214. #endif
  215. }