NetworkTask.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340
  1. #include <Kernel/Net/E1000NetworkAdapter.h>
  2. #include <Kernel/Net/EthernetFrameHeader.h>
  3. #include <Kernel/Net/ARP.h>
  4. #include <Kernel/Net/ICMP.h>
  5. #include <Kernel/Net/UDP.h>
  6. #include <Kernel/Net/TCP.h>
  7. #include <Kernel/Net/IPv4.h>
  8. #include <Kernel/Net/IPv4Socket.h>
  9. #include <Kernel/Net/TCPSocket.h>
  10. #include <Kernel/Net/UDPSocket.h>
  11. #include <Kernel/Net/LoopbackAdapter.h>
  12. #include <Kernel/Process.h>
  13. #include <Kernel/Net/EtherType.h>
  14. #include <Kernel/Lock.h>
  15. //#define ETHERNET_DEBUG
  16. #define IPV4_DEBUG
  17. //#define ICMP_DEBUG
  18. #define UDP_DEBUG
  19. #define TCP_DEBUG
  20. static void handle_arp(const EthernetFrameHeader&, int frame_size);
  21. static void handle_ipv4(const EthernetFrameHeader&, int frame_size);
  22. static void handle_icmp(const EthernetFrameHeader&, int frame_size);
  23. static void handle_udp(const EthernetFrameHeader&, int frame_size);
  24. static void handle_tcp(const EthernetFrameHeader&, int frame_size);
  25. Lockable<HashMap<IPv4Address, MACAddress>>& arp_table()
  26. {
  27. static Lockable<HashMap<IPv4Address, MACAddress>>* the;
  28. if (!the)
  29. the = new Lockable<HashMap<IPv4Address, MACAddress>>;
  30. return *the;
  31. }
  32. void NetworkTask_main()
  33. {
  34. LoopbackAdapter::the();
  35. auto* adapter_ptr = E1000NetworkAdapter::the();
  36. ASSERT(adapter_ptr);
  37. auto& adapter = *adapter_ptr;
  38. adapter.set_ipv4_address(IPv4Address(192, 168, 5, 2));
  39. auto dequeue_packet = [&] () -> ByteBuffer {
  40. if (LoopbackAdapter::the().has_queued_packets())
  41. return LoopbackAdapter::the().dequeue_packet();
  42. if (adapter.has_queued_packets())
  43. return adapter.dequeue_packet();
  44. return { };
  45. };
  46. kprintf("NetworkTask: Enter main loop.\n");
  47. for (;;) {
  48. auto packet = dequeue_packet();
  49. if (packet.is_null()) {
  50. // FIXME: Wake up when one of the adapters has packets.
  51. current->sleep(1);
  52. continue;
  53. }
  54. if (packet.size() < (int)(sizeof(EthernetFrameHeader))) {
  55. kprintf("NetworkTask: Packet is too small to be an Ethernet packet! (%d)\n", packet.size());
  56. continue;
  57. }
  58. auto& eth = *(const EthernetFrameHeader*)packet.pointer();
  59. #ifdef ETHERNET_DEBUG
  60. kprintf("NetworkTask: From %s to %s, ether_type=%w, packet_length=%u\n",
  61. eth.source().to_string().characters(),
  62. eth.destination().to_string().characters(),
  63. eth.ether_type(),
  64. packet.size()
  65. );
  66. #endif
  67. switch (eth.ether_type()) {
  68. case EtherType::ARP:
  69. handle_arp(eth, packet.size());
  70. break;
  71. case EtherType::IPv4:
  72. handle_ipv4(eth, packet.size());
  73. break;
  74. }
  75. }
  76. }
  77. void handle_arp(const EthernetFrameHeader& eth, int frame_size)
  78. {
  79. constexpr int minimum_arp_frame_size = sizeof(EthernetFrameHeader) + sizeof(ARPPacket);
  80. if (frame_size < minimum_arp_frame_size) {
  81. kprintf("handle_arp: Frame too small (%d, need %d)\n", frame_size, minimum_arp_frame_size);
  82. return;
  83. }
  84. auto& packet = *static_cast<const ARPPacket*>(eth.payload());
  85. if (packet.hardware_type() != 1 || packet.hardware_address_length() != sizeof(MACAddress)) {
  86. kprintf("handle_arp: Hardware type not ethernet (%w, len=%u)\n",
  87. packet.hardware_type(),
  88. packet.hardware_address_length()
  89. );
  90. return;
  91. }
  92. if (packet.protocol_type() != EtherType::IPv4 || packet.protocol_address_length() != sizeof(IPv4Address)) {
  93. kprintf("handle_arp: Protocol type not IPv4 (%w, len=%u)\n",
  94. packet.hardware_type(),
  95. packet.protocol_address_length()
  96. );
  97. return;
  98. }
  99. #ifdef ARP_DEBUG
  100. kprintf("handle_arp: operation=%w, sender=%s/%s, target=%s/%s\n",
  101. packet.operation(),
  102. packet.sender_hardware_address().to_string().characters(),
  103. packet.sender_protocol_address().to_string().characters(),
  104. packet.target_hardware_address().to_string().characters(),
  105. packet.target_protocol_address().to_string().characters()
  106. );
  107. #endif
  108. if (packet.operation() == ARPOperation::Request) {
  109. // Who has this IP address?
  110. if (auto* adapter = NetworkAdapter::from_ipv4_address(packet.target_protocol_address())) {
  111. // We do!
  112. kprintf("handle_arp: Responding to ARP request for my IPv4 address (%s)\n",
  113. adapter->ipv4_address().to_string().characters());
  114. ARPPacket response;
  115. response.set_operation(ARPOperation::Response);
  116. response.set_target_hardware_address(packet.sender_hardware_address());
  117. response.set_target_protocol_address(packet.sender_protocol_address());
  118. response.set_sender_hardware_address(adapter->mac_address());
  119. response.set_sender_protocol_address(adapter->ipv4_address());
  120. adapter->send(packet.sender_hardware_address(), response);
  121. }
  122. return;
  123. }
  124. if (packet.operation() == ARPOperation::Response) {
  125. // Someone has this IPv4 address. I guess we can try to remember that.
  126. // FIXME: Protect against ARP spamming.
  127. // FIXME: Support static ARP table entries.
  128. LOCKER(arp_table().lock());
  129. arp_table().resource().set(packet.sender_protocol_address(), packet.sender_hardware_address());
  130. kprintf("ARP table (%d entries):\n", arp_table().resource().size());
  131. for (auto& it : arp_table().resource()) {
  132. kprintf("%s :: %s\n", it.value.to_string().characters(), it.key.to_string().characters());
  133. }
  134. }
  135. }
  136. void handle_ipv4(const EthernetFrameHeader& eth, int frame_size)
  137. {
  138. constexpr int minimum_ipv4_frame_size = sizeof(EthernetFrameHeader) + sizeof(IPv4Packet);
  139. if (frame_size < minimum_ipv4_frame_size) {
  140. kprintf("handle_ipv4: Frame too small (%d, need %d)\n", frame_size, minimum_ipv4_frame_size);
  141. return;
  142. }
  143. auto& packet = *static_cast<const IPv4Packet*>(eth.payload());
  144. #ifdef IPV4_DEBUG
  145. kprintf("handle_ipv4: source=%s, target=%s\n",
  146. packet.source().to_string().characters(),
  147. packet.destination().to_string().characters()
  148. );
  149. #endif
  150. switch ((IPv4Protocol)packet.protocol()) {
  151. case IPv4Protocol::ICMP:
  152. return handle_icmp(eth, frame_size);
  153. case IPv4Protocol::UDP:
  154. return handle_udp(eth, frame_size);
  155. case IPv4Protocol::TCP:
  156. return handle_tcp(eth, frame_size);
  157. default:
  158. kprintf("handle_ipv4: Unhandled protocol %u\n", packet.protocol());
  159. break;
  160. }
  161. }
  162. void handle_icmp(const EthernetFrameHeader& eth, int frame_size)
  163. {
  164. (void)frame_size;
  165. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  166. auto& icmp_header = *static_cast<const ICMPHeader*>(ipv4_packet.payload());
  167. #ifdef ICMP_DEBUG
  168. kprintf("handle_icmp: source=%s, destination=%s, type=%b, code=%b\n",
  169. ipv4_packet.source().to_string().characters(),
  170. ipv4_packet.destination().to_string().characters(),
  171. icmp_header.type(),
  172. icmp_header.code()
  173. );
  174. #endif
  175. {
  176. LOCKER(IPv4Socket::all_sockets().lock());
  177. for (RetainPtr<IPv4Socket> socket : IPv4Socket::all_sockets().resource()) {
  178. LOCKER(socket->lock());
  179. if (socket->protocol() != (unsigned)IPv4Protocol::ICMP)
  180. continue;
  181. socket->did_receive(ByteBuffer::copy(&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  182. }
  183. }
  184. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  185. if (!adapter)
  186. return;
  187. if (icmp_header.type() == ICMPType::EchoRequest) {
  188. auto& request = reinterpret_cast<const ICMPEchoPacket&>(icmp_header);
  189. kprintf("handle_icmp: EchoRequest from %s: id=%u, seq=%u\n",
  190. ipv4_packet.source().to_string().characters(),
  191. (word)request.identifier,
  192. (word)request.sequence_number
  193. );
  194. size_t icmp_packet_size = ipv4_packet.payload_size();
  195. auto buffer = ByteBuffer::create_zeroed(icmp_packet_size);
  196. auto& response = *(ICMPEchoPacket*)buffer.pointer();
  197. response.header.set_type(ICMPType::EchoReply);
  198. response.header.set_code(0);
  199. response.identifier = request.identifier;
  200. response.sequence_number = request.sequence_number;
  201. if (size_t icmp_payload_size = icmp_packet_size - sizeof(ICMPEchoPacket))
  202. memcpy(response.payload(), request.payload(), icmp_payload_size);
  203. response.header.set_checksum(internet_checksum(&response, icmp_packet_size));
  204. adapter->send_ipv4(eth.source(), ipv4_packet.source(), IPv4Protocol::ICMP, move(buffer));
  205. }
  206. }
  207. void handle_udp(const EthernetFrameHeader& eth, int frame_size)
  208. {
  209. (void)frame_size;
  210. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  211. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  212. if (!adapter) {
  213. kprintf("handle_udp: this packet is not for me, it's for %s\n", ipv4_packet.destination().to_string().characters());
  214. return;
  215. }
  216. auto& udp_packet = *static_cast<const UDPPacket*>(ipv4_packet.payload());
  217. #ifdef UDP_DEBUG
  218. kprintf("handle_udp: source=%s:%u, destination=%s:%u length=%u\n",
  219. ipv4_packet.source().to_string().characters(),
  220. udp_packet.source_port(),
  221. ipv4_packet.destination().to_string().characters(),
  222. udp_packet.destination_port(),
  223. udp_packet.length()
  224. );
  225. #endif
  226. auto socket = UDPSocket::from_port(udp_packet.destination_port());
  227. if (!socket) {
  228. kprintf("handle_udp: No UDP socket for port %u\n", udp_packet.destination_port());
  229. return;
  230. }
  231. ASSERT(socket->type() == SOCK_DGRAM);
  232. ASSERT(socket->source_port() == udp_packet.destination_port());
  233. socket->did_receive(ByteBuffer::copy(&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  234. }
  235. void handle_tcp(const EthernetFrameHeader& eth, int frame_size)
  236. {
  237. (void)frame_size;
  238. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  239. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  240. if (!adapter) {
  241. kprintf("handle_tcp: this packet is not for me, it's for %s\n", ipv4_packet.destination().to_string().characters());
  242. return;
  243. }
  244. auto& tcp_packet = *static_cast<const TCPPacket*>(ipv4_packet.payload());
  245. size_t payload_size = ipv4_packet.payload_size() - tcp_packet.header_size();
  246. #ifdef TCP_DEBUG
  247. kprintf("handle_tcp: source=%s:%u, destination=%s:%u seq_no=%u, ack_no=%u, flags=%w (%s %s), window_size=%u, payload_size=%u\n",
  248. ipv4_packet.source().to_string().characters(),
  249. tcp_packet.source_port(),
  250. ipv4_packet.destination().to_string().characters(),
  251. tcp_packet.destination_port(),
  252. tcp_packet.sequence_number(),
  253. tcp_packet.ack_number(),
  254. tcp_packet.flags(),
  255. tcp_packet.has_syn() ? "SYN" : "",
  256. tcp_packet.has_ack() ? "ACK" : "",
  257. tcp_packet.window_size(),
  258. payload_size
  259. );
  260. #endif
  261. auto socket = TCPSocket::from_port(tcp_packet.destination_port());
  262. if (!socket) {
  263. kprintf("handle_tcp: No TCP socket for port %u\n", tcp_packet.destination_port());
  264. return;
  265. }
  266. ASSERT(socket->type() == SOCK_STREAM);
  267. ASSERT(socket->source_port() == tcp_packet.destination_port());
  268. if (tcp_packet.ack_number() != socket->sequence_number()) {
  269. kprintf("handle_tcp: ack/seq mismatch: got %u, wanted %u\n", tcp_packet.ack_number(), socket->sequence_number());
  270. return;
  271. }
  272. if (tcp_packet.has_syn() && tcp_packet.has_ack()) {
  273. socket->set_ack_number(tcp_packet.sequence_number() + payload_size + 1);
  274. socket->send_tcp_packet(TCPFlags::ACK);
  275. socket->set_connected(true);
  276. kprintf("handle_tcp: Connection established!\n");
  277. socket->set_state(TCPSocket::State::Connected);
  278. return;
  279. }
  280. if (tcp_packet.has_fin()) {
  281. kprintf("handle_tcp: Got FIN, payload_size=%u\n", payload_size);
  282. if (payload_size != 0)
  283. socket->did_receive(ByteBuffer::copy(&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  284. socket->set_ack_number(tcp_packet.sequence_number() + payload_size + 1);
  285. socket->send_tcp_packet(TCPFlags::FIN | TCPFlags::ACK);
  286. socket->set_state(TCPSocket::State::Disconnecting);
  287. return;
  288. }
  289. socket->set_ack_number(tcp_packet.sequence_number() + payload_size);
  290. kprintf("Got packet with ack_no=%u, seq_no=%u, payload_size=%u, acking it with new ack_no=%u, seq_no=%u\n",
  291. tcp_packet.ack_number(),
  292. tcp_packet.sequence_number(),
  293. payload_size,
  294. socket->ack_number(),
  295. socket->sequence_number()
  296. );
  297. socket->send_tcp_packet(TCPFlags::ACK);
  298. if (payload_size != 0)
  299. socket->did_receive(ByteBuffer::copy(&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  300. }