UDPSocket.cpp 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <Kernel/Devices/RandomDevice.h>
  8. #include <Kernel/Net/NetworkAdapter.h>
  9. #include <Kernel/Net/Routing.h>
  10. #include <Kernel/Net/UDP.h>
  11. #include <Kernel/Net/UDPSocket.h>
  12. #include <Kernel/Process.h>
  13. #include <Kernel/Random.h>
  14. namespace Kernel {
  15. void UDPSocket::for_each(Function<void(UDPSocket const&)> callback)
  16. {
  17. sockets_by_port().for_each_shared([&](auto const& socket) {
  18. callback(*socket.value);
  19. });
  20. }
  21. ErrorOr<void> UDPSocket::try_for_each(Function<ErrorOr<void>(UDPSocket const&)> callback)
  22. {
  23. return sockets_by_port().with_shared([&](auto const& sockets) -> ErrorOr<void> {
  24. for (auto& socket : sockets)
  25. TRY(callback(*socket.value));
  26. return {};
  27. });
  28. }
  29. static Singleton<MutexProtected<HashMap<u16, UDPSocket*>>> s_map;
  30. MutexProtected<HashMap<u16, UDPSocket*>>& UDPSocket::sockets_by_port()
  31. {
  32. return *s_map;
  33. }
  34. RefPtr<UDPSocket> UDPSocket::from_port(u16 port)
  35. {
  36. return sockets_by_port().with_shared([&](auto const& table) -> RefPtr<UDPSocket> {
  37. auto it = table.find(port);
  38. if (it == table.end())
  39. return {};
  40. return (*it).value;
  41. });
  42. }
  43. UDPSocket::UDPSocket(int protocol, NonnullOwnPtr<DoubleBuffer> receive_buffer)
  44. : IPv4Socket(SOCK_DGRAM, protocol, move(receive_buffer), {})
  45. {
  46. }
  47. UDPSocket::~UDPSocket()
  48. {
  49. sockets_by_port().with_exclusive([&](auto& table) {
  50. table.remove(local_port());
  51. });
  52. }
  53. ErrorOr<NonnullRefPtr<UDPSocket>> UDPSocket::try_create(int protocol, NonnullOwnPtr<DoubleBuffer> receive_buffer)
  54. {
  55. return adopt_nonnull_ref_or_enomem(new (nothrow) UDPSocket(protocol, move(receive_buffer)));
  56. }
  57. ErrorOr<size_t> UDPSocket::protocol_size(ReadonlyBytes raw_ipv4_packet)
  58. {
  59. auto& ipv4_packet = *(IPv4Packet const*)(raw_ipv4_packet.data());
  60. auto& udp_packet = *static_cast<UDPPacket const*>(ipv4_packet.payload());
  61. return udp_packet.length() - sizeof(UDPPacket);
  62. }
  63. ErrorOr<size_t> UDPSocket::protocol_receive(ReadonlyBytes raw_ipv4_packet, UserOrKernelBuffer& buffer, size_t buffer_size, [[maybe_unused]] int flags)
  64. {
  65. auto& ipv4_packet = *(IPv4Packet const*)(raw_ipv4_packet.data());
  66. auto& udp_packet = *static_cast<UDPPacket const*>(ipv4_packet.payload());
  67. VERIFY(udp_packet.length() >= sizeof(UDPPacket)); // FIXME: This should be rejected earlier.
  68. size_t read_size = min(buffer_size, udp_packet.length() - sizeof(UDPPacket));
  69. SOCKET_TRY(buffer.write(udp_packet.payload(), read_size));
  70. return read_size;
  71. }
  72. ErrorOr<size_t> UDPSocket::protocol_send(UserOrKernelBuffer const& data, size_t data_length)
  73. {
  74. auto adapter = bound_interface().with([](auto& bound_device) -> RefPtr<NetworkAdapter> { return bound_device; });
  75. auto routing_decision = route_to(peer_address(), local_address(), adapter);
  76. if (routing_decision.is_zero())
  77. return set_so_error(EHOSTUNREACH);
  78. auto ipv4_payload_offset = routing_decision.adapter->ipv4_payload_offset();
  79. data_length = min(data_length, routing_decision.adapter->mtu() - ipv4_payload_offset - sizeof(UDPPacket));
  80. const size_t udp_buffer_size = sizeof(UDPPacket) + data_length;
  81. auto packet = routing_decision.adapter->acquire_packet_buffer(ipv4_payload_offset + udp_buffer_size);
  82. if (!packet)
  83. return set_so_error(ENOMEM);
  84. memset(packet->buffer->data() + ipv4_payload_offset, 0, sizeof(UDPPacket));
  85. auto& udp_packet = *reinterpret_cast<UDPPacket*>(packet->buffer->data() + ipv4_payload_offset);
  86. udp_packet.set_source_port(local_port());
  87. udp_packet.set_destination_port(peer_port());
  88. udp_packet.set_length(udp_buffer_size);
  89. SOCKET_TRY(data.read(udp_packet.payload(), data_length));
  90. routing_decision.adapter->fill_in_ipv4_header(*packet, local_address(), routing_decision.next_hop,
  91. peer_address(), IPv4Protocol::UDP, udp_buffer_size, type_of_service(), ttl());
  92. routing_decision.adapter->send_packet(packet->bytes());
  93. return data_length;
  94. }
  95. ErrorOr<void> UDPSocket::protocol_connect(OpenFileDescription&)
  96. {
  97. set_role(Role::Connected);
  98. set_connected(true);
  99. return {};
  100. }
  101. ErrorOr<u16> UDPSocket::protocol_allocate_local_port()
  102. {
  103. constexpr u16 first_ephemeral_port = 32768;
  104. constexpr u16 last_ephemeral_port = 60999;
  105. constexpr u16 ephemeral_port_range_size = last_ephemeral_port - first_ephemeral_port;
  106. u16 first_scan_port = first_ephemeral_port + get_good_random<u16>() % ephemeral_port_range_size;
  107. return sockets_by_port().with_exclusive([&](auto& table) -> ErrorOr<u16> {
  108. for (u16 port = first_scan_port;;) {
  109. auto it = table.find(port);
  110. if (it == table.end()) {
  111. set_local_port(port);
  112. table.set(port, this);
  113. return port;
  114. }
  115. ++port;
  116. if (port > last_ephemeral_port)
  117. port = first_ephemeral_port;
  118. if (port == first_scan_port)
  119. break;
  120. }
  121. return set_so_error(EADDRINUSE);
  122. });
  123. }
  124. ErrorOr<void> UDPSocket::protocol_bind()
  125. {
  126. return sockets_by_port().with_exclusive([&](auto& table) -> ErrorOr<void> {
  127. if (table.contains(local_port()))
  128. return set_so_error(EADDRINUSE);
  129. table.set(local_port(), this);
  130. return {};
  131. });
  132. }
  133. }