NetworkTask.cpp 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. #include <Kernel/E1000NetworkAdapter.h>
  2. #include <Kernel/EthernetFrameHeader.h>
  3. #include <Kernel/ARP.h>
  4. #include <Kernel/ICMP.h>
  5. #include <Kernel/UDP.h>
  6. #include <Kernel/TCP.h>
  7. #include <Kernel/IPv4.h>
  8. #include <Kernel/IPv4Socket.h>
  9. #include <Kernel/TCPSocket.h>
  10. #include <Kernel/Process.h>
  11. #include <Kernel/EtherType.h>
  12. #include <AK/Lock.h>
  13. //#define ETHERNET_DEBUG
  14. #define IPV4_DEBUG
  15. //#define ICMP_DEBUG
  16. #define UDP_DEBUG
  17. #define TCP_DEBUG
  18. static void handle_arp(const EthernetFrameHeader&, int frame_size);
  19. static void handle_ipv4(const EthernetFrameHeader&, int frame_size);
  20. static void handle_icmp(const EthernetFrameHeader&, int frame_size);
  21. static void handle_udp(const EthernetFrameHeader&, int frame_size);
  22. static void handle_tcp(const EthernetFrameHeader&, int frame_size);
  23. Lockable<HashMap<IPv4Address, MACAddress>>& arp_table()
  24. {
  25. static Lockable<HashMap<IPv4Address, MACAddress>>* the;
  26. if (!the)
  27. the = new Lockable<HashMap<IPv4Address, MACAddress>>;
  28. return *the;
  29. }
  30. void NetworkTask_main()
  31. {
  32. auto* e1000_ptr = E1000NetworkAdapter::the();
  33. ASSERT(e1000_ptr);
  34. auto& e1000 = *e1000_ptr;
  35. e1000.set_ipv4_address(IPv4Address(192, 168, 5, 2));
  36. kprintf("NetworkTask: Enter main loop.\n");
  37. for (;;) {
  38. auto packet = e1000.dequeue_packet();
  39. if (packet.is_null()) {
  40. sleep(100);
  41. continue;
  42. }
  43. if (packet.size() < (int)(sizeof(EthernetFrameHeader))) {
  44. kprintf("NetworkTask: Packet is too small to be an Ethernet packet! (%d)\n", packet.size());
  45. continue;
  46. }
  47. auto& eth = *(const EthernetFrameHeader*)packet.pointer();
  48. #ifdef ETHERNET_DEBUG
  49. kprintf("NetworkTask: From %s to %s, ether_type=%w, packet_length=%u\n",
  50. eth.source().to_string().characters(),
  51. eth.destination().to_string().characters(),
  52. eth.ether_type(),
  53. packet.size()
  54. );
  55. #endif
  56. switch (eth.ether_type()) {
  57. case EtherType::ARP:
  58. handle_arp(eth, packet.size());
  59. break;
  60. case EtherType::IPv4:
  61. handle_ipv4(eth, packet.size());
  62. break;
  63. }
  64. }
  65. }
  66. void handle_arp(const EthernetFrameHeader& eth, int frame_size)
  67. {
  68. constexpr int minimum_arp_frame_size = sizeof(EthernetFrameHeader) + sizeof(ARPPacket);
  69. if (frame_size < minimum_arp_frame_size) {
  70. kprintf("handle_arp: Frame too small (%d, need %d)\n", frame_size, minimum_arp_frame_size);
  71. return;
  72. }
  73. auto& packet = *static_cast<const ARPPacket*>(eth.payload());
  74. if (packet.hardware_type() != 1 || packet.hardware_address_length() != sizeof(MACAddress)) {
  75. kprintf("handle_arp: Hardware type not ethernet (%w, len=%u)\n",
  76. packet.hardware_type(),
  77. packet.hardware_address_length()
  78. );
  79. return;
  80. }
  81. if (packet.protocol_type() != EtherType::IPv4 || packet.protocol_address_length() != sizeof(IPv4Address)) {
  82. kprintf("handle_arp: Protocol type not IPv4 (%w, len=%u)\n",
  83. packet.hardware_type(),
  84. packet.protocol_address_length()
  85. );
  86. return;
  87. }
  88. #ifdef ARP_DEBUG
  89. kprintf("handle_arp: operation=%w, sender=%s/%s, target=%s/%s\n",
  90. packet.operation(),
  91. packet.sender_hardware_address().to_string().characters(),
  92. packet.sender_protocol_address().to_string().characters(),
  93. packet.target_hardware_address().to_string().characters(),
  94. packet.target_protocol_address().to_string().characters()
  95. );
  96. #endif
  97. if (packet.operation() == ARPOperation::Request) {
  98. // Who has this IP address?
  99. if (auto* adapter = NetworkAdapter::from_ipv4_address(packet.target_protocol_address())) {
  100. // We do!
  101. kprintf("handle_arp: Responding to ARP request for my IPv4 address (%s)\n",
  102. adapter->ipv4_address().to_string().characters());
  103. ARPPacket response;
  104. response.set_operation(ARPOperation::Response);
  105. response.set_target_hardware_address(packet.sender_hardware_address());
  106. response.set_target_protocol_address(packet.sender_protocol_address());
  107. response.set_sender_hardware_address(adapter->mac_address());
  108. response.set_sender_protocol_address(adapter->ipv4_address());
  109. adapter->send(packet.sender_hardware_address(), response);
  110. }
  111. return;
  112. }
  113. if (packet.operation() == ARPOperation::Response) {
  114. // Someone has this IPv4 address. I guess we can try to remember that.
  115. // FIXME: Protect against ARP spamming.
  116. // FIXME: Support static ARP table entries.
  117. LOCKER(arp_table().lock());
  118. arp_table().resource().set(packet.sender_protocol_address(), packet.sender_hardware_address());
  119. kprintf("ARP table (%d entries):\n", arp_table().resource().size());
  120. for (auto& it : arp_table().resource()) {
  121. kprintf("%s :: %s\n", it.value.to_string().characters(), it.key.to_string().characters());
  122. }
  123. }
  124. }
  125. void handle_ipv4(const EthernetFrameHeader& eth, int frame_size)
  126. {
  127. constexpr int minimum_ipv4_frame_size = sizeof(EthernetFrameHeader) + sizeof(IPv4Packet);
  128. if (frame_size < minimum_ipv4_frame_size) {
  129. kprintf("handle_ipv4: Frame too small (%d, need %d)\n", frame_size, minimum_ipv4_frame_size);
  130. return;
  131. }
  132. auto& packet = *static_cast<const IPv4Packet*>(eth.payload());
  133. #ifdef IPV4_DEBUG
  134. kprintf("handle_ipv4: source=%s, target=%s\n",
  135. packet.source().to_string().characters(),
  136. packet.destination().to_string().characters()
  137. );
  138. #endif
  139. switch ((IPv4Protocol)packet.protocol()) {
  140. case IPv4Protocol::ICMP:
  141. return handle_icmp(eth, frame_size);
  142. case IPv4Protocol::UDP:
  143. return handle_udp(eth, frame_size);
  144. case IPv4Protocol::TCP:
  145. return handle_tcp(eth, frame_size);
  146. default:
  147. kprintf("handle_ipv4: Unhandled protocol %u\n", packet.protocol());
  148. break;
  149. }
  150. }
  151. void handle_icmp(const EthernetFrameHeader& eth, int frame_size)
  152. {
  153. (void)frame_size;
  154. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  155. auto& icmp_header = *static_cast<const ICMPHeader*>(ipv4_packet.payload());
  156. #ifdef ICMP_DEBUG
  157. kprintf("handle_icmp: source=%s, destination=%s, type=%b, code=%b\n",
  158. ipv4_packet.source().to_string().characters(),
  159. ipv4_packet.destination().to_string().characters(),
  160. icmp_header.type(),
  161. icmp_header.code()
  162. );
  163. #endif
  164. {
  165. LOCKER(IPv4Socket::all_sockets().lock());
  166. for (RetainPtr<IPv4Socket> socket : IPv4Socket::all_sockets().resource()) {
  167. LOCKER(socket->lock());
  168. if (socket->protocol() != (unsigned)IPv4Protocol::ICMP)
  169. continue;
  170. socket->did_receive(ByteBuffer::copy((const byte*)&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  171. }
  172. }
  173. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  174. if (!adapter)
  175. return;
  176. if (icmp_header.type() == ICMPType::EchoRequest) {
  177. auto& request = reinterpret_cast<const ICMPEchoPacket&>(icmp_header);
  178. kprintf("handle_icmp: EchoRequest from %s: id=%u, seq=%u\n",
  179. ipv4_packet.source().to_string().characters(),
  180. (word)request.identifier,
  181. (word)request.sequence_number
  182. );
  183. size_t icmp_packet_size = ipv4_packet.payload_size();
  184. auto buffer = ByteBuffer::create_zeroed(icmp_packet_size);
  185. auto& response = *(ICMPEchoPacket*)buffer.pointer();
  186. response.header.set_type(ICMPType::EchoReply);
  187. response.header.set_code(0);
  188. response.identifier = request.identifier;
  189. response.sequence_number = request.sequence_number;
  190. if (size_t icmp_payload_size = icmp_packet_size - sizeof(ICMPEchoPacket))
  191. memcpy(response.payload(), request.payload(), icmp_payload_size);
  192. response.header.set_checksum(internet_checksum(&response, icmp_packet_size));
  193. adapter->send_ipv4(eth.source(), ipv4_packet.source(), IPv4Protocol::ICMP, move(buffer));
  194. }
  195. }
  196. void handle_udp(const EthernetFrameHeader& eth, int frame_size)
  197. {
  198. (void)frame_size;
  199. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  200. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  201. if (!adapter) {
  202. kprintf("handle_udp: this packet is not for me, it's for %s\n", ipv4_packet.destination().to_string().characters());
  203. return;
  204. }
  205. auto& udp_packet = *static_cast<const UDPPacket*>(ipv4_packet.payload());
  206. #ifdef UDP_DEBUG
  207. kprintf("handle_udp: source=%s:%u, destination=%s:%u length=%u\n",
  208. ipv4_packet.source().to_string().characters(),
  209. udp_packet.source_port(),
  210. ipv4_packet.destination().to_string().characters(),
  211. udp_packet.destination_port(),
  212. udp_packet.length()
  213. );
  214. #endif
  215. auto socket = IPv4Socket::from_udp_port(udp_packet.destination_port());
  216. if (!socket) {
  217. kprintf("handle_udp: No UDP socket for port %u\n", udp_packet.destination_port());
  218. return;
  219. }
  220. ASSERT(socket->type() == SOCK_DGRAM);
  221. ASSERT(socket->source_port() == udp_packet.destination_port());
  222. socket->did_receive(ByteBuffer::copy((const byte*)&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  223. }
  224. void handle_tcp(const EthernetFrameHeader& eth, int frame_size)
  225. {
  226. (void)frame_size;
  227. auto& ipv4_packet = *static_cast<const IPv4Packet*>(eth.payload());
  228. auto* adapter = NetworkAdapter::from_ipv4_address(ipv4_packet.destination());
  229. if (!adapter) {
  230. kprintf("handle_tcp: this packet is not for me, it's for %s\n", ipv4_packet.destination().to_string().characters());
  231. return;
  232. }
  233. auto& tcp_packet = *static_cast<const TCPPacket*>(ipv4_packet.payload());
  234. size_t payload_size = ipv4_packet.payload_size() - tcp_packet.header_size();
  235. #ifdef TCP_DEBUG
  236. kprintf("handle_tcp: source=%s:%u, destination=%s:%u seq_no=%u, ack_no=%u, flags=%w (%s %s), window_size=%u, payload_size=%u\n",
  237. ipv4_packet.source().to_string().characters(),
  238. tcp_packet.source_port(),
  239. ipv4_packet.destination().to_string().characters(),
  240. tcp_packet.destination_port(),
  241. tcp_packet.sequence_number(),
  242. tcp_packet.ack_number(),
  243. tcp_packet.flags(),
  244. tcp_packet.has_syn() ? "SYN" : "",
  245. tcp_packet.has_ack() ? "ACK" : "",
  246. tcp_packet.window_size(),
  247. payload_size
  248. );
  249. #endif
  250. auto socket = IPv4Socket::from_tcp_port(tcp_packet.destination_port());
  251. if (!socket) {
  252. kprintf("handle_tcp: No TCP socket for port %u\n", tcp_packet.destination_port());
  253. return;
  254. }
  255. ASSERT(socket->type() == SOCK_STREAM);
  256. ASSERT(socket->source_port() == tcp_packet.destination_port());
  257. if (tcp_packet.ack_number() != socket->sequence_number()) {
  258. kprintf("handle_tcp: ack/seq mismatch: got %u, wanted %u\n",tcp_packet.ack_number(), socket->sequence_number());
  259. return;
  260. }
  261. if (tcp_packet.has_syn() && tcp_packet.has_ack()) {
  262. socket->set_ack_number(tcp_packet.sequence_number() + payload_size + 1);
  263. socket->send_tcp_packet(TCPFlags::ACK);
  264. socket->set_connected(true);
  265. kprintf("handle_tcp: Connection established!\n");
  266. socket->set_state(TCPSocket::State::Connected);
  267. return;
  268. }
  269. socket->set_ack_number(tcp_packet.sequence_number() + payload_size);
  270. kprintf("Got packet with ack_no=%u, seq_no=%u, payload_size=%u, acking it with new ack_no=%u, seq_no=%u\n",
  271. tcp_packet.ack_number(),
  272. tcp_packet.sequence_number(),
  273. payload_size,
  274. socket->ack_number(),
  275. socket->sequence_number()
  276. );
  277. socket->send_tcp_packet(TCPFlags::ACK);
  278. if (payload_size != 0)
  279. socket->did_receive(ByteBuffer::copy((const byte*)&ipv4_packet, sizeof(IPv4Packet) + ipv4_packet.payload_size()));
  280. }